By Topic

2010 IEEE Symposium on Visual Languages and Human-Centric Computing

21-25 Sept. 2010

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (14124 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (209 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2010, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2010, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2010, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Freely Available from IEEE
  • Model-Driven Research in Human-Centric Computing

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    How can we build systems that enable users to mix and match tools together? How will we know whether we have done a good job in creating usable visual interactive systems that help users accomplish a wide variety of goals? How can people share the results of their explorations with each other, and for innovative tools to be remixed? Widely-used tools such as Web Browsers, Wikis, spreadsheets, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Security Engineering with UML: The Last Decade and towards the Future (Keynote)

    Publication Year: 2010, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    The current state of the art in developing security-critical software and systems in practice is far from satisfactory: New security vulnerabilities are discovered on an almost daily basis. To address this problem, there has been a significant amount of work over the last 10 years on providing model-based development approaches based on the Unified Modeling Language which aim to raise the trustwor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cleanroom: Edit-Time Error Detection with the Uniqueness Heuristic

    Publication Year: 2010, Page(s):7 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1135 KB) | HTML iconHTML

    Many dynamic programming language features, such as implicit declaration, reflection, and code generation, make it difficult to verify the existence of identifiers through standard program analysis. We present an alternative verification, which, rather than analyzing the semantics of code, highlights any name or pair of names that appear only once across a program's source files. This uniqueness h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calcite: Completing Code Completion for Constructors Using Crowds

    Publication Year: 2010, Page(s):15 - 22
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB) | HTML iconHTML

    Calcite is a new Eclipse plugin that helps address the difficulty of understanding and correctly using an API. Calcite finds the most popular ways to instantiate a given class or interface by using code examples. To allow the users to easily add these object instantiations to their code, Calcite adds items to the popup completion menu that will insert the appropriate code into the user's program. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Association Metrics to Help Users Navigate API Documentation

    Publication Year: 2010, Page(s):23 - 30
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    In the past decade there has been spectacular growth in the number and size of third-party libraries, frameworks, toolkits and other Application Programming Interfaces (APIs) available to modern software developers. However, the time-saving advantages of code re-use are commonly hampered by the difficulty in finding the correct methods for a given task among the thousands of irrelevant ones. We ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging Concurrent Software: A Study Using Multithreaded Sequence Diagrams

    Publication Year: 2010, Page(s):33 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Concurrent software is notoriously difficult to debug. We investigate the use of UML sequence diagrams to help developers correctly reason about the potential behaviors of buggy concurrent software. We conducted a controlled experiment that compared internal (i.e., "in the head") and external representations for reasoning about multithreaded software. For external representations, participants cre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explanatory Debugging: Supporting End-User Debugging of Machine-Learned Programs

    Publication Year: 2010, Page(s):41 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1160 KB) | HTML iconHTML

    Many machine-learning algorithms learn rules of behavior from individual end users, such as task-oriented desktop organizers and handwriting recognizers. These rules form a “program” that tells the computer what to do when future inputs arrive. Little research has explored how an end user can debug these programs when they make mistakes. We present our progress toward enabling end us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does My Model Work? Evaluation Abstractions of Cognitive Modelers

    Publication Year: 2010, Page(s):49 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1110 KB) | HTML iconHTML

    Are the abstractions that scientific modelers use to build their models in a modeling language the same abstractions they use to evaluate the correctness of their models? The extent to which such differences exist seems likely to correspond to additional effort of modelers in determining whether their models work as intended. In this paper, we therefore investigate the distinction between "program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards the Automatic Recognition of Computational Thinking for Adaptive Visual Language Learning

    Publication Year: 2010, Page(s):59 - 66
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Visual programming languages can be used to make computer science more accessible to a broad range of students. The evaluative focus of current research in the area of visual languages for educational purposes primarily aims to better understand motivational benefits as compared to traditional programming languages. Often these visual languages claim to teach students computational thinking concep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Young People's Descriptions of Computational Rules in Role-Playing Games: An Empirical Study

    Publication Year: 2010, Page(s):67 - 74
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (986 KB) | HTML iconHTML

    A study was carried out which examined the extent to which young people aged 11-12, with no prior instruction in programming, are able to write computational rules which govern play in a 3D computer role-playing game. Expressing these rules required the use of common computational structures such as conditionals, sets and loops. We analysed the rules written for their structure and style, and reco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing a Process of Collaborative Game Design Involving Online Tools

    Publication Year: 2010, Page(s):75 - 78
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    We explore modeling problem solving and design using state-space-search methodology by engaging in the design of an educational game. We also explore how online communication tools (OCTs) could be used to support collaborative design using two online tools: 1) CoSolve, a collaborative problem-solving environment we developed, and 2) INFACT, a discussion forum that we built for use in education. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • First Steps in Coding by Informal Web Developers

    Publication Year: 2010, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    While prior research has investigated the practices of experienced web developers, little is known about the initial coding episodes of novices who are on the cusp of web development. Through interviews with library and information science students who have completed a web development course, we explore coding challenges that novices face and the emergence of strategies in response to them. Our re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SheetDiff: A Tool for Identifying Changes in Spreadsheets

    Publication Year: 2010, Page(s):85 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    Most spreadsheets, like other software, change over time. A frequently occurring scenario is the repeated reuse and adaptation of spreadsheets from one project to another. If several versions of one spreadsheet for grading/ budgeting/etc. have accumulated, it is often not obvious which one to choose for the next project. In situations like these, an understanding of how two versions of a spreadshe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatically Inferring ClassSheet Models from Spreadsheets

    Publication Year: 2010, Page(s):93 - 100
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1009 KB) | HTML iconHTML

    Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, designing such models is time consuming and requires expertise beyond the knowledge to work with spreadsheets. Legacy spreadsheets pose a particular challenge to the approach of controlling spreadsheet evolution through hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Causal Reasoning with Neuron Diagrams

    Publication Year: 2010, Page(s):101 - 108
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    The principle of causation is fundamental to science and society and has remained an active topic of discourse in philosophy for over two millennia. Modern philosophers often rely on ``neuron diagrams'', a domain-specific visual language for discussing and reasoning about causal relationships and the concept of causation itself. In this paper we formalize the syntax and semantics of neuron diagram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Euler Graph Transformations for Euler Diagram Layout

    Publication Year: 2010, Page(s):111 - 118
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    Euler diagrams are frequently used for visualizing information about collections of objects and form an important component of various visual languages. Properties possessed by Euler diagrams correlate with their usability, such as whether the diagram has only simple curves or possesses concurrency. Sometimes, every diagram that represents some given information possesses some undesirable properti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.