In this paper, we describe a way to identify the critical coordination needs that exist in a software development project through post-mortem content analysis and manual coding of task pairs. Our coding scheme provide...
详细信息
ISBN:
(纸本)9781450323130
In this paper, we describe a way to identify the critical coordination needs that exist in a software development project through post-mortem content analysis and manual coding of task pairs. Our coding scheme provides guidelines on how to score the strength of the relationship of task pairs based on four characteristics. Such a method and coding scheme has the potential to become a research tool that can be used within the community of researchers and practitioners interested in the sociotechnical aspects of software development to identify coordination needs for their analysis in future studies. We seek community feedback to help improve the proposed coding scheme. Copyright 2013 ACM.
Several methods exist to detect the coordination needs within software teams. Evidence exists that developers' awareness about coordination needs improves work performance. Distinguishing with certainty between cr...
详细信息
ISBN:
(纸本)9781450322379
Several methods exist to detect the coordination needs within software teams. Evidence exists that developers' awareness about coordination needs improves work performance. Distinguishing with certainty between critical and trivial coordination needs and identifying and prioritizing which specific tasks a pair of developers should coordinate about remains an open problem. We investigate what work dependencies should be considered when establishing coordination needs within a development team. We use our conceptualization of work dependencies named Proximity and leverage machine learning techniques to analyze what additional task properties are indicative of coordination needs. In a case study of the Mylyn project, we were able to identify from all potential coordination requirements a subset of 17% that are most critical. We define critical coordination requirements as those that can cause the most disruption to task duration when left unmanaged. These results imply that coordination awareness tools could be enhanced to make developers aware of only the coordination needs that can bring about the highest performance benefit. Copyright 2013 ACM.
Volume data analysis often involves finding structures inside the volume. Segmentation is the standard method, but it is quite time-consuming. Alternate approaches remove context, assume prior definition of ROI or seg...
详细信息
ISBN:
(纸本)9781467360975
Volume data analysis often involves finding structures inside the volume. Segmentation is the standard method, but it is quite time-consuming. Alternate approaches remove context, assume prior definition of ROI or segments, or distort part of the volume. We propose a new bimanual 3D interaction technique, called Volume Cracker (VC), which allows the user to crack open a volume like a book to analyze the internal structures. VC preserves context by always displaying all the voxels, and by connecting the sub-volumes with curves joining the cracked faces. We discuss the various design choices that we made, based on observations from our prior user studies with volume datasets, inputs from domain scientists, and numerous design studios and brainstorming sessions. We also report the results of a user study comparing VC with a standard desktop interaction technique and a standard 3D bimanual interaction technique. The study used tasks from two categories of a volume analysis task taxonomy that we are designing in consultation with domain scientists. We found VC had significant advantages over the other two techniques for search and pattern recognition tasks.
Given the rapid evolution of social networks and online communities, interest in participatory cultures - online and offline social spaces with low barriers to entry and support for creating and sharing knowledge - is...
详细信息
We have augmented the Deep Thought logic tutor with a Hint Factory that generates data-driven, context-specific hints for an existing computer aided instructional tool. We investigate the impact of the Hint Factory...
详细信息
We investigate cognitive factors that are predictive of learning gains when students learn to solve equations by teaching a synthetic peer, called SimStudent. Previous empirical studies showed that prior knowledge is ...
详细信息
We investigate cognitive factors that are predictive of learning gains when students learn to solve equations by teaching a synthetic peer, called SimStudent. Previous empirical studies showed that prior knowledge is strongly predictive of post-test scores. However, in a recent study in the Philippines that replicated our previous study in the USA, there were students with low priorknowledge who tutored their SimStudent better than other equally low prior students. In this paper, we analyze both process data (tutoring interactions) and outcome data (test scores) to understand what makes learning by teaching more effective. The results imply a presence of individual behavioral differences beyond the difference in the prior knowledge that might have affected SimStudent's learning, which in turn had non-trivial influence on tutor learning.
This paper examines the relationship between motivational design and its longitudinal effects on crowdsourcing systems. In the context of a company internal web site that crowdsources the identification of Twitter acc...
This lecture describes a theoretical framework for the behavioural sciences that holds high promise for theory-driven research and design in human-computer *** framework is designed to tackle the adaptive, ecological,...
详细信息
Web Spam is the result of a number of methods to deceive search engine algorithms so as to obtain higher ranks in the search results. Advanced spammers use keyword and link stuffing methods to create farms of spam pag...
详细信息
Autism spectrum and related communication and social disorders can severely affect some children's ability to engage in peer social interaction. In this article, we describe and evaluate an Authorable Virtual Peer...
详细信息
暂无评论