The ACSW papers are now available via the ACM DL. Please select the "Table of Contents" tab on the right to see the papers.
Program At A Glance
TUESDAY 2nd FEBRUARY 2016 |
|||
STREAM 1 |
STREAM 2 |
||
09:00 - 17:00 |
CORE Heads and Profs meeting Includes breaks and lunch |
ACE Doctoral consortium Includes breaks and lunch |
|
17:30 - 19:30 |
WELCOME RECEPTION |
||
19:00 - 21:00 |
CORE HEADS AND PROFS DINNER |
08:30 - 09:00 |
CONFERENCE OPEN + CORE AWARDS
|
||||||||
09:00 - 10:00 |
|||||||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
TechLauncher |
||||||
SESSION 1
|
*** | ||||||||
** | |||||||||
*** | |||||||||
11:15 - 11:45 |
MORNING TEA
|
||||||||
SESSION 2
|
*** | ||||||||
** | |||||||||
*** | |||||||||
13:00 - 14:00 |
LUNCH |
||||||||
SESSION 3
|
*** | ||||||||
** | |||||||||
*** | |||||||||
15:15 - 15:45 |
AFTERNOON TEA |
||||||||
SESSION 4 |
|||||||||
19:00 - 21:00 |
CONFERENCE DINNER |
09:00 - 10:00 |
PLENARY |
||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
Exhibition |
||
SESSION 1
|
|||||
11:15 - 11:45 |
MORNING TEA |
||||
SESSION 2
|
|||||
13:00 - 14:00 |
LUNCH |
||||
SESSION 3
|
|||||
15:15 - 15:45 |
AFTERNOON TEA |
||||
SESSION 4
|
09:00 - 10:00 |
PLENARY |
||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
STREAM 4 |
Exhibition |
|
SESSION 1
|
ACE workshop
Developing Computational Thinking with Sprego
Includes break |
ACE workshop
Benchmarking and Curriculum Improvement for the Computing Disciplines
Includes break |
|||
11:15 - 11:45 |
MORNING TEA |
||||
SESSION 2
|
|||||
13:00 - 14:00 |
LUNCH |
||||
SESSION 3
|
ACE workshop Using Cognitive Load Theory to Improve Troublesome Courses Includes break |
W3C Workshop A partial tutorial and history of CSS, with discussion Includes break |
|||
15:15 - 15:45 |
AFTERNOON TEA |
||||
SESSION 4 |
Technical Program
WEDNESDAY 3rd FEBRUARY 2016
08:30 - 09:00 |
CONFERENCE OPEN + CORE AWARDS
|
||||||||
09:00 - 10:00 |
|||||||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
TechLauncher |
||||||
SESSION 1
|
*** | ||||||||
** | |||||||||
*** | |||||||||
11:15 - 11:45 |
MORNING TEA
|
||||||||
SESSION 2
|
*** | ||||||||
** | |||||||||
*** | |||||||||
13:00 - 14:00 |
LUNCH |
||||||||
SESSION 3
|
*** | ||||||||
** | |||||||||
*** | |||||||||
15:15 - 15:45 |
AFTERNOON TEA |
||||||||
SESSION 4 |
|||||||||
19:00 - 21:00 |
CONFERENCE DINNER |
PLENARY: A Human-Centred View of Big Personal Data: Scrutable User Models for Privacy and Control
Speaker: Judy Kay (The University of Sydney, Australia)
Abstract: My work aims to enable people to harness, control and manage their big personal data. To really achieve this, many sub-disciplines of computer science need to take a human-centred perspective. People are generating vast, and growing, collections of personal data, captured by rich personal digital ecosystems of devices. Users explicitly store some data but systems also capture the user's digital footprints, ranging from simple clicks and touches, to data from body-worn devices, to images, audio and video. This personal data resides in a quite bewildering range of places, from personal devices to cloud stores, in multitudes of silos. Big personal data may be of modest size compared with big scientific data, but people consider their data stores as big, because they are complex and hard to control and harness. A driving goal for my research has been to tackle the challenges of big personal data by creating infrastructures, representations and interfaces that enable a user to scrutinize and control their personal data in a scrutable user model. This talk will present examples of that research including diverse roles for personalisation from teaching to online dating and in novel interfaces for interactive tables and walls. It will also highlight directions for human-centred approaches to ensure privacy and control of big personal data.
Bio: Judy Kay is Professor of Computer Science. She leads the Human Centred Technology Research Cluster, one of three priority clusters in the Faculty of Engineering and IT at the University of Sydney. Her own lab, CHAI, Computer Human Adapted Interaction Research Group aims to create new technologies for human computer interaction (HCI). Her personalisation research has created the Personis user modelling framework. Personis models are distinctive in that they were designed to be scrutable, because interfaces enable the user to scrutinise their user model and personalisation processes based on it. Her interface research has created the Cruiser Natural User Interaction (NIU) software framework. This provides new ways for people to make use of large interactive tabletops and wall displays. By mining the digital footprints of such interaction, this research is creating new ways for people to learn to collaborate, and to learn and work more collaboratively.
Her research has been commercialised and deployed and she has extensive publications, in venues such as the conferences Pervasive, Computer Human Interaction (CHI), User Modeling (UM, AH, UMAP) and journals, such as IEEE Transactions on Knowledge and Data Engineering, International Journal of Artificial Intelligence in Education, User Modeling and User-Adapted Interaction, Personal and Ubiquitous Computing, Communications of the ACM, Computer Science Education.
Session 1: 10:00 - 11:15
ACSC 1 Session Chair: Rajeev Gore
13 |
Daniel Alarcon and Rajeev Gore. Efficient Error Localisation and Imputation for Real-World Census Databases Using SMT |
|
5 |
Vincent Mwintieru Nofong. EDTrend: A Methodology for Trend Prediction with Emerging and Decaying Patterns |
|
10:50 |
114 |
Nathaniel Baxter, Geoffrey Chu and Peter J Stuckey. Symmetry Declarations for MiniZinc |
HIKM 1 Session Chair: Anthony Maeder
10:00 |
133 |
Daniel Grunwell and Tony Sahama. Delegation of access in an Information Accountability Framework for eHealth |
10:25 |
79 |
Alofi Black and Tony Sahama. Chronicling the patient journey: Co-creating Value with Digital Healthcare Ecosystems |
10:50 |
151 |
Rosemary Sayvong and Joanne Curry. Patient Journey Modelling as a Policy Mapping Method: Enhancing the Understanding of Policy Analysis |
ACE 1 Session Chair: Matt Butler
10:00 |
105 |
Vincent Gramoli, Michael Charleston, Bryn Jeffries, Irena Koprinska, Martin McGrane, Anastasios Viglas, Kalina Yacef and Alex Radu. Mining Autograding Data in Computer Science Education |
10:25 |
76 |
Shaymaa Sorour and Tsunenori Mine. Exploring Students' Learning Attributes in Consecutive Lessons to Improve Prediction Performance |
140 |
Simon and Judy Sheard. Academic integrity and computing assessments Best ACE paper |
Session 2: 11:45 - 13:00
AISC 1 Session Chair: Xun Yi
72 |
Thomas Haines and Xavier Boyen. VOTOR: Conceptually Simple Remote Voting against Tiny Tyrants |
|
12:10 |
35 |
Hassan Qahur Al Mahri, Leonie Simpson, Bartlett Harry, Ed Dawson and Kenneth Koon-Ho Wong. Forgery Attacks on ++AE Authenticated Encryption Mode |
12:35 |
166 |
Vishesh Bhartiya and Leonie Simpson. Initialisation Flaws in the A5-GMR-1 Satphone Encryption Algorithm |
HIKM 2 Session Chair: Trish Willaims
11:45 |
89 |
Golenur Huq, Jim Basilakis and Anthony Maeder. Evaluation of Tri-axial accelerometery data of falls for elderly through smart phone |
71 |
Lindsay Shaw, Burkhard Wuensche, Christof Lutteroth, Romain Tourrel, Stefan Marks, Jude Buckley and Paul Corballis. Design of a Virtual
Trainer for Exergaming |
|
12:35 |
26 |
Sarita Pais, Dave Parry, Elaine Rush and Janet Rowan. Data Integration for Mobile Wellness Apps to Support Treatment of GDM |
AUIC 1 Session Chair: Andrew Luxton-Reilly
11:45 |
20 |
Phi Giang Pham and Mao Lin Huang. MCquery: Interactive Visual Query of Relational Data with Coordinating Context Displays |
12:10 |
43 |
Masood Masoodian, Saturnino Luz and David Kavenga. nu-view: A Visualization System for Collaborative Co-located Analysis of Geospatial Disease Data |
15 |
Dale Patterson. 3D Spirals, Bubbles and Sliders - Setting Range Values in Multi-User 3D Environments |
Session 3: 14:00 - 15:15
IE 1 Session Chair: Karen Blackmore
38 |
William Goddard, Jayden Garner and Mads Moller Jensen. Designing for Social Play in Co-located Mobile Games |
|
14:25 |
11 |
Chen Si, Yusuf Pisan and Chek Tien Tan. Understanding Players' Map Exploration Styles |
14:50 |
90 |
Daniel Hickmott, Shamus Smith, Ross Bille, Elizabeth Burd, Liz Stephens and Erica Southgate. Building Apostrophe Power: Lessons Learnt for Serious Games Development |
ACE 2 Session Chair: Julie Prior
14:00 |
83 |
Wen Chin Hsu and Scott Plunkett. Attendance and Grades in Learning Programming Classes |
123 |
Rohini Balapumi, Brian R. von Konsky, Ashley Aitken and David A. McMeekin. Factors Influencing University Students' Self-Regulation of
Learning: An Exploratory Study |
|
14:50 |
91 |
Matthew Butler, Jane Sinclair, Michael Morgan and Sara Kalvara. Comparing International Indicators of Student Engagement for Computer Science |
HIKM 3 Session Chair: Tony Sahama
14:00 |
112 |
I-Yang Huang, Mark Watkin, Ian Warren and Andrew Meads. Eye Atlas: A Resource for Ophthalmology Students |
14:25 |
163 |
Arif Khan, Shahadat Uddin and Uma Srinivasan. Adapting Graph Theory and Social Network Measures on Healthcare Data - a New Framework to Understand Chronic Disease Progression |
17 |
Ivan Rivera, Jim Warren and James Curran. Quantifying Mood, Content and Dynamics of Health Forums |
Session 4: 15:45 - 17:00
IE + ACSC 2 Session Chair: Karen Blackmore
15:45 |
126 |
Mitchell Metcalfe, Brendan Annable, Monica Olejniczak and Stephan K. Chalup. A Study on Detecting Three-Dimensional Balls using Boosted Classifiers (IE paper) |
|
|
|
16:10 |
84 |
Jack Parry, Daniel Hunter, Kenneth Radke and Colin Fidge. A Network Forensics Tool for Precise Data Packet Capture and Replay in Cyber-Physical Systems |
ACE 3 Session Chair: Simon
15:45 |
101 |
Julia Prior, Samuel Ferguson and John Leaney. Reflection is Hard: Teaching And Learning Reflective Practice in a Software Studio |
16:10 |
49 |
Michelle Craig and Andrew Petersen. Student Difficulties with Pointer Concepts in C |
AWC Session Chair: Kerry Taylor
15:45 |
16 |
Ross J. Bille, Yuqing Lin and Stephan K. Chalup. RTCSS: A Framework for Developing Real-Time Peer-to-Peer Web Applications |
16:10 |
97 |
Feiyan Yu, Geoff West, Lesley Arnold, David McMeekin and Simon Moncrieff. Automatic Geospatial Data Conflation Using Semantic Web Technologies |
16:35 |
153 |
Martin Stabauer, Georg Grossmann and Markus Stumptner. State of the Art in Knowledge Extraction from Online Polls |
THURSDAY 4TH FEBRUARY 2016
09:00 - 10:00 |
PLENARY |
||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
Exhibition |
||
SESSION 1
|
|||||
11:15 - 11:45 |
MORNING TEA |
||||
SESSION 2
|
|||||
13:00 - 14:00 |
LUNCH |
||||
SESSION 3
|
|||||
15:15 - 15:45 |
AFTERNOON TEA |
||||
SESSION 4
|
PLENARY: Semantic Sensor Networks: The Internet of Things needs the Web of Data
Speaker: Kerry Taylor, Chair W3C/OGC Spatial Data on the Web Working Group
Abstract: Gartner said in December that smart cities will use 1.6 billion connected things in 2016 rising to 3.3 billion in 2018. Large scale sensor network systems are not only features of cities and consumer products; but also of the interlinked industries of agriculture, manufacturing, food and health care. The AIOTI alliance of the European Commission concluded in November that “The biggest challenge will be to overcome the fragmentation of vertically-oriented closed systems, architectures and application areas and move towards horizontal open systems and platforms that support multiple applications.” This reflects an environment where a great number of industry alliances and SDOs have formed with a vertical silo approach for service and data interoperability.
On the other hand, ontologies founded on description logic are one of the few success stories for decades of research in knowledge representation and are now standardised and widely used for horizontal data interoperability, in the framework called the Semantic Web or the Web of Data. Formal reasoning is at the heart of a growing number of deployed tools and applications for data interoperability within enterprises and across government.
The Semantic Sensor Networks ontology was originally developed by a collaboration hosted by the W3C in 2009, to describe aspects of sensor networks and sensor data that is needed for loosely-connected interoperability and interpretation at a level above communications networking. The ontology has now entered the standards track of the W3C and OGC through the joint Spatial Data on the Web Working Group. In this talk I will discuss the role of ontologies in the developing Internet of Things and my hopes for the SSN ontology in particular.
Bio: Kerry joined the Australian National University four weeks ago. For the previous six months she was working as a specialist at the Australian Bureau of Statistics after 20 years at CSIRO as a research scientist in the division now known as data61. Her research has focused on data and system integration in multidisciplinary contexts, and she has been working with semantic and sensor systems for at least ten years now. She has also worked as an IT professional in the consulting, publishing, and education industries and government.
Kerry holds a BSc Hons in Computer Science from UNSW 1983 and a PhD in Computer Science and Information Technology from the ANU in 1996. She is a Visiting Reader at the University of Surrey.
Session 1: 10:00 - 11:15
IE 2 Session Chair: Yusuf Pisan
10:00 |
24 |
Karen Blackmore, William Coppins and Keith Nesbitt. Using Startle Reflex to Compare Playing and Watching in a Horror Game |
10:25 |
52 |
Scott Donaldson. Towards a Typology of Metagames |
10:50 |
158 |
Daniel Wheat, Martin Masek, Peng Chiou Lam and Philip Hingston. Modeling Perceived Difficulty in Game Levels |
ACE 4 Session Chair: Raina Mason
10:00 |
41 |
Donna Teague, Colin Fidge and Xu Yue. Combining Unsupervised and Invigilated Assessment of Introductory Programming |
10:25 |
109 |
Sam Kavanagh and Andrew Luxton-Reilly. Rubrics used in Peer Assessment |
10:50 |
115 |
Teemu Rajala, Erkki Kaila, Rolf Linden, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso and Tapio Salakoski. Automatically assessed electronic exams in programming courses |
AISC 2 Session Chair: Xu Huang
10:00 |
129 |
Nikki Robins, Trish Williams and Krishnun Sansurooah. I know what you did last summer... An Investigation into Remnant Data on USB Storage Devices Sold in Australia in 2015. |
10:25 |
81 |
Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson and Josef Pieprzyk. Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN |
10:50 |
122 |
Arran Stewart, Rachel Cardell-Oliver and Rowan Davies. Fine-grained classification of side-effect free methods in real-world Java code and applications to software security |
Session 2: 11:45 - 13:00
AUIC 2 Session Chair: Thuong Hoang
11:45 |
14 |
Benjamin Shelton and Keith Nesbitt. The Aesthetic Awareness Display: a New Design Pattern for Ambient Information Systems |
12:10 |
27 |
Kurt Geihs and Christoph Evers. User Intervention in Self-Adaptive Context-Aware Applications |
12:35 |
4 |
Steven Wark and Marcin Nowina-Krowicki. Generating Multimedia Narrative For Virtual Humans |
ACE 5 Session Chair: Judy Sheard
11:45 |
10 |
Carbone Angela and Margaret Hamilton. Pizza with university ICT students: What do students expect employers want? |
12:10 |
100 |
Matt Stevens and Richard Norman. Industry Expectations of Soft Skills in IT Graduates |
12:35 |
139 |
Phillipa Sturgess, Michael Cowling and Michelle Gray. Unpacking 'Digital Competency': Exploring the Pre-Existing Skills of Enabling Education Students |
ACSC 3 Session Chair: Bob Kummerfeld
11:45 |
22 |
Sung Eun Bae, Tong-Wook Shinn and Tadao Takaoka. An Efficient Parallel Algorithm for the Maximum Convex Sum Problem |
12:10 |
87 |
Wing-Kai Hon, Ton Kloks and Hsiang-Hsuan Liu. On the $P_3$-Convexity of Some Classes of Graphs with Few $P_4$s and Permutation Graphs |
12:35 |
116 |
Mahdi Parsa and Vlad Estivill-Castro. Hardness and tractability of detecting connected communities |
Session 3: 14:00 - 15:15
IE 3 Session Chair: Martin Masek
14:00 |
77 |
Geoffrey Hookham, Frances Kay-Lambkin, Karen Blackmore and Keith Nesbitt. Using Startle Probe to Compare Affect and Engagement between a Serious Game and an Online Intervention Program |
14:25 |
73 |
Dale Patterson. Interactive 3D Web Applications for Visualization of World Health Organization Data |
14:50 |
95 |
Jan Kruse, Ricardo Sosa and Andy M. Connor. Procedural Urban Environments for FPS Games |
ACE 6 Session Chair: Margaret Hamilton
14:00 |
6 |
Ovidiu Noran. On Gamification in Action Learning |
14:25 |
8 |
Patricia Haden, Joy Gasson, Krissi Wood and Dale Parsons. Can You Learn To Teach Programming in Two Days? |
14:50 |
46 |
Nazish Khan and Andrew Luxton-Reilly. Is Computing for Social Good the Solution to Closing the Gender Gap in Computer Science? |
AISC 3 Session Chair: Leonie Simpson
14:00 |
159 |
Masood Mansoori, Ian Welch and Ebrahim Hashemi. Measurement of IP and Network Tracking Behaviour of Malicious Websites |
14:25 |
124 |
Nicholas Rodofile, Kenneth Radke and Ernest Foo. DNP3 Network Scanning and Reconnaissance For Critical Infrastructure |
14:50 |
25 |
Xu Huang, Muhammad R. Ahmed, Raul Fernandez Rojas, Hongyan Cui and Mohammed Aseeri. Effective Algorithm for Protecting WSNs from Internal Attacks in Real-Time |
Session 4: 15:45 - 17:00
AUIC 3 Session Chair: Thuong Hoang
15:45 |
98 |
Carolyn Seton and Raina Mason. Decreasing the Digital Divide - Analysing the UI requirements of older Australians |
16:10 |
110 |
Geoffrey Hookham, Keith Nesbitt and Frances Kay-Lambkin. Comparing Usability and Engagement between a Serious Game and a Traditional Online Program |
16:35 |
135 |
Kartik Andalam, Kirushi Arunthavasothy, Raoul D'cunha, Shreya Shah, Andrew Luxton-Reilly and Beryl Plimmer. Surface Air Hockey: A Step Towards Smart Tangibles |
ACE 7 Session Chair: SIGCSE Chair
15:45 |
SIGCSE meeting |
ACSC 4 Session Chair: Marshima Mohd Rosli
15:45 |
63 |
Leila Eskandari, Zhiyi Huang and David Eyers. P-Scheduler: Adaptive Hierarchical Scheduling in Apache Storm |
16:10 |
59 |
Sarawat Anam, Yang Sok Kim, Byeong Ho Kang and Qing Liu. Adapting A Knowledge-based Schema Matching System for Ontology Mapping |
16:35 |
80 |
Marshima Mohd Rosli, Ewan Tempero and Andrew Luxton-Reilly. What is in our datasets? Describing a structure of datasets. |
FRIDAY 5th FEBRUARY 2016
09:00 - 10:00 |
PLENARY |
||||
STREAM 1 |
STREAM 2 |
STREAM 3 |
STREAM 4 |
Exhibition |
|
SESSION 1
|
ACE workshop
Developing Computational Thinking with Sprego
Includes break |
ACE workshop
Benchmarking and Curriculum Improvement for the Computing Disciplines
Includes break |
|||
11:15 - 11:45 |
MORNING TEA |
||||
SESSION 2
|
|||||
13:00 - 14:00 |
LUNCH |
||||
SESSION 3
|
ACE workshop Using Cognitive Load Theory to Improve Troublesome Courses Includes break |
W3C Workshop A partial tutorial and history of CSS, with discussion Includes break |
|||
15:15 - 15:45 |
AFTERNOON TEA |
||||
SESSION 4 |
PLENARY: Supporting students' development of metacognition and problem solving skills
Speaker: Geraldine Torrisi-Steele
Abstract: The importance of metacognition and problem solving skills in academic achievement is well recognised. However, even in higher education students often lack academic metacognitive capacities. Now more than ever, we are in a position where it is crucial that we refocus on these skills. In talking about lifelong learning, graduate attributes and graduates that are "future proof" we must pay explicit attention to supporting the development of such skills.
Teaching large first year introduction to coding classes within information technology and multimedia degree programs poses some challenges. Students' knowledge of, and interest in, coding ranges from `I've never written a single line of code; coding is not my thing', to `I've already written a major application; coding is my life', to everything in between. Typically the majority of students in my classes have very little or no understanding of coding. Assessment performance, course satisfaction and pass rates can be `very average'. Informal and formal data gathered from these classes indicates that poorly developed metacognitive capacities is a major contributing factor to students' lack of success in such courses.
In effort to place much-needed emphasis on metacognition and problem solving skills, and in order to open some discussion, I use the case of one particularly challenging course to share experiences, strategies and approaches to support students' growth in metacognition and problem solving skills in introductory coding courses.
Bio: Geraldine Torrisi-Steele is a senior lecturer within the School of Information and Communication Technology at Griffith University, where she teaches undergraduate courses within the multimedia and information technology degree programs. Her background in secondary science education and in the design and development of interactive e-learning, has precipitated a strong interest in learning and teaching, the user experience and user interface design design, and the application of digital media to educational contexts.
Session 1: 10:00 - 11:15
AISC 4 Session Chair: Xu Huang
10:00 |
134 |
Bonnie Gambhir and Udaya Parampalli. Personally Controlled & Privacy Preserving Medication Management System |
10:25 |
96 |
Ar Kar Kyaw, Pulin Agrawal and Brian Cusack. Wi-Pi: A Study of WLAN Security in Auckland CBD |
10:50 |
121 |
Joseph Alley and Josef Pieprzyk. State Recovery Attacks against p-Cipher |
ACSC 5 Session Chair: Vlad Estivill-Castro
10:00 |
42 |
Yang Yu, Hui Ma and Mengjie Zhang. A Genetic Programming Approach to Distributed Execution of Data-Intensive Web Service Compositions |
10:25 |
36 |
Maryam Golchin and Alan Wee-Chung Liew. Bicluster Detection using Strength Pareto Front Evolutionary Algorithm |
10:50 |
53 |
Victor W. Chu, Raymond Wong, Fang Chen, Ivan Ho and Joe Lee. Market-sentiment Boosted Predictions on Multi-type Time-Series |
Session 2: 11:45 - 13:00
AISC + APCMM Session Chair: Markus Stumptner
11:45 |
132 |
Farhad Moghimifar and Douglas Stebila. Predicting TLS performance from key exchange performance |
12:10 |
55 |
John Wondoh, Georg Grossmann and Markus Stumptner. Utilising Bitemporal Information for Business Process Contingency Management |
12:35 |
67 |
Felix Burgstaller, Dieter Steiner, Bernd Neumayr, Michael Schrefl and Eduard Gringinger. Using a Model-driven, Knowledge-based Approach to Cope with Complexity in Filtering of Notices to Airmen |
ACE Workshops
Developing computational thinking with Sprego
Friday 5th February 10am-1pm
Maria Csernoch, Faculty of Informatics, University of Debrecen, Hungary, csernoch.maria@inf.unideb.hu
Abstract: Sprego is a deep approach problem solving method in spreadsheet environments, and as such does not apply the popular but ineffective surface approach methods. The main characteristics of Sprego is that it uses as few general purpose functions as possible and based on these functions users can build multilevel formulas to solve real world problems. In this approach the focus is on the problem, instead of the technical and coding details. Relying on the functional language of spreadsheets, Sprego can serve as an introductory language to high level programming languages and as the ultimate language of end-users who do not want to be professional programmers. The method requires no more background knowledge than the concept of function from Mathematics, so it can be taught at various levels of education. Teachers from primary to tertiary education and end-users from any subject are welcomed at the workshop. We introduce the method, present and solve problems, with which we can demonstrate how the students' computational thinking, algorithmic and debugging skills can be developed in spreadsheet environments with real world problems based on authentic tables.
Expected Outcomes: The participant can learn the core of the method, how to solve problems with a concept-based approach in spreadsheets and experience the hindrance of the widely accepted surface approach methods. We can share ideas how students would benefit the most from this approach, we can collect unique solutions to the presented problems, and ideas for further problems and sources for improving Sprego.
Equipment Needs: participants are required to bring laptops with Excel or OpenOffice, LibreOffice Calc
Benchmarking and Curriculum Improvement for the Computing Disciplines
Friday 5th February 10am-1pm
Chris Johnson, Executive Officer, ACDICT
Abstract:The workshop will help Associate Deans (L&T) in Schools of computing and information systems, and other educational developers, to meet peers and develop relationships that will be of use in doing benchmarking, and plan how to implement review processes that are workload-efficient and effective Benchmarking the standard of degrees is a challenge to disciplines like computing in all universities. The publication of Threshold Learning Standards for the broad academic disciplines (Engineering and ICT, in our case) gives sub-disciplines the opportunity to refine standards for their own specialisation, and re-examine their curricula and their development and review processes. The recently tabled Australian Government Higher Education Framework has emphasis on regular comparator review, which brings standards into consideration as the basis for benchmarking. Some of the pressure to ensure graduate standards also comes from employers, and from tax-payers as funders of university education. An effective peer review process has to satisfy students, employers (collectively as industry), academics, politicians, and regulators. The Threshold Standards are very broad and long term; the immediate needs of industry are often expressed narrowly and for the short-term. Academics often draw on their own long educational experience for ideas of content, measures, and approaches to teaching. Academic planners and leaders need to know these conflicting requirements and how to steer between them to benefit Schools and students.
Using Cognitive Load Theory to improve troublesome courses
Friday 5th February 2-5pm
Dr Raina Mason (Southern Cross University)
Carolyn Seton (Southern Cross University)
Abstract: Cognitive Load Theory (CLT) focuses on human cognitive architecture; the concepts of long term and working memory and their interplay. CLT has been successfully applied to the design of instructional materials for technical areas, leading to increased student learning. Principles and techniques derived from CLT are usually applied to individual topics or sub- topics of content. Our approach looks at whole-of-course design, as well as examining individual instructional materials. Participants in the workshop will be taken through a case study; and then introduced to the Cognitive Assistance Factor Evaluation (CAFE') toolkit. CAFE' is a new web-based course evaluation toolkit for use by developers and academics, based on principles and techniques from CLT. The toolkit will assist in identifying potential existing weaknesses and propose interventions that are successful at improving courses. It also provides relevant links to research on each principle and technique. This workshop will be particularly suited to those participants who have responsibility for a course which contains novices, or find that some of their students disengage early with the material, "learn" material one day but are unable to do near transfer problems afterwards, or a course that currently has a relatively high attrition or failure rate.
Expected Outcomes: Participants will be introduced to a case study of a successful redevelopment, will be given access to the CAFE' toolkit, and will identify some strategies for improving their own course. Anonymised data will also be used as a pilot for a larger research project on the usage of the toolkit for computer science/IT education and usage in other disciplines.
Equipment Needs: Participants will require a laptop or tablet, and web access. Participants should also bring along course(/paper/unit) outlines/material or materials from a poorly performing topic or section within a course, to review during the workshop.
W3C Workshops
A partial tutorial and history of CSS, with discussion
Friday 5th February 2-5pm
Bert Bos (W3C)
Abstract:
CSS (Cascading Style Sheets) is the technology that allows Web authors to specify the layout of Web pages and apps. It is a standard made by W3C. The first parts were published already in 1996 and 1998, but new parts are still being added.
In this workshop we'll look at some parts ("modules") of CSS, both older and recent ones, with excursions into how these modules were developed and why they are the way they are.
The tutorial part is probably easiest to follow for people who know a little about CSS already, but the syntax is easy enough to pick up.
The background information requires no prior knowledge and should be interesting for people who want to know how international standards are made in practice.... or want to help make them.
Expected Outcomes:
Participants interested in writing CSS style sheets will hopefully learn some new things about CSS. The presenter himself hopes to learn from the participants some fresh ideas about how to develop CSS further and how W3C can develop it most efficiently.
Equipment Needs:
No equipment needed, but if you bring a laptop (with a reasonably recent Web browser) you will be able to try some of the examples yourself.
Australasian Computing Education Conference (ACE)
105 | Vincent Gramoli, Michael Charleston, Bryn Jeffries, Irena Koprinska, Martin McGrane, Anastasios Viglas, Kalina Yacef and Alex Radu. Mining Autograding Data in Computer Science Education |
76 | Shaymaa Sorour and Tsunenori Mine. Exploring Students' Learning Attributes in Consecutive Lessons to Improve Prediction Performance |
140 | Simon and Judy Sheard. Academic integrity and computing assessments |
83 | Wen Chin Hsu and Scott Plunkett. Attendance and Grades in Learning Programming Classes |
123 | Rohini Balapumi, Brian R. von Konsky, Ashley Aitken and David A. McMeekin. Factors Influencing University Students' Self-Regulation of Learning: An Exploratory Study |
91 | Matthew Butler, Jane Sinclair, Michael Morgan and Sara Kalvara. Comparing International Indicators of Student Engagement for Computer Science |
101 | Julia Prior, Samuel Ferguson and John Leaney. Reflection is Hard: Teaching And Learning Reflective Practice in a Software Studio |
49 | Michelle Craig and Andrew Petersen. Student Difficulties with Pointer Concepts in C |
41 | Donna Teague, Colin Fidge and Xu Yue. Combining Unsupervised and Invigilated Assessment of Introductory Programming |
109 | Sam Kavanagh and Andrew Luxton-Reilly. Rubrics used in Peer Assessment |
115 | Teemu Rajala, Erkki Kaila, Rolf Linden, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso and Tapio Salakoski. Automatically assessed electronic exams in programming courses |
10 | Carbone Angela and Margaret Hamilton. Pizza with university ICT students: What do students expect employers want? |
100 | Matt Stevens and Richard Norman. Industry Expectations of Soft Skills in IT Graduates |
139 | Phillipa Sturgess, Michael Cowling and Michelle Gray. Unpacking 'Digital Competency': Exploring the Pre-Existing Skills of Enabling Education Students |
6 | Ovidiu Noran. On Gamification in Action Learning |
8 | Patricia Haden, Joy Gasson, Krissi Wood and Dale Parsons. Can You Learn To Teach Programming in Two Days? |
46 | Nazish Khan and Andrew Luxton-Reilly. Is Computing for Social Good the Solution to Closing the Gender Gap in Computer Science? |
Australasian Computer Science Conference (ACSC)
13 | Daniel Alarcon and Rajeev Gore. Efficient Error Localisation and Imputation for Real-World Census Databases Using SMT |
5 | Vincent Mwintieru Nofong. EDTrend: A Methodology for Trend Prediction with Emerging and Decaying Patterns |
114 | Nathaniel Baxter, Geoffrey Chu and Peter J Stuckey. Symmetry Declarations for MiniZinc |
88 | Nehad Albadri, Richard Watson and Stijn Dekeyser. TreeTags: Bringing Tags to the Hierarchical File System |
84 | Jack Parry, Daniel Hunter, Kenneth Radke and Colin Fidge. A Network Forensics Tool for Precise Data Packet Capture and Replay in Cyber-Physical Systems |
22 | Sung Eun Bae, Tong-Wook Shinn and Tadao Takaoka. An Efficient Parallel Algorithm for the Maximum Convex Sum Problem |
87 | Wing-Kai Hon, Ton Kloks and Hsiang-Hsuan Liu. On the $P_3$-Convexity of Some Classes of Graphs with Few $P_4$s and Permutation Graphs |
116 | Mahdi Parsa and Vlad Estivill-Castro. Hardness and tractability of detecting connected communities |
63 | Leila Eskandari, Zhiyi Huang and David Eyers. P-Scheduler: Adaptive Hierarchical Scheduling in Apache Storm |
59 | Sarawat Anam, Yang Sok Kim, Byeong Ho Kang and Qing Liu. Adapting A Knowledge-based Schema Matching System for Ontology Mapping |
80 | Marshima Mohd Rosli, Ewan Tempero and Andrew Luxton-Reilly. What is in our datasets? Describing a structure of datasets. |
42 | Yang Yu, Hui Ma and Mengjie Zhang. A Genetic Programming Approach to Distributed Execution of Data-Intensive Web Service Compositions |
36 | Maryam Golchin and Alan Wee-Chung Liew. Bicluster Detection using Strength Pareto Front Evolutionary Algorithm |
53 | Victor W. Chu, Raymond Wong, Fang Chen, Ivan Ho and Joe Lee. Market-sentiment Boosted Predictions on Multi-type Time-Series |
Australasian Information Security Conference (AISC)
72 | Thomas Haines and Xavier Boyen. VOTOR: Conceptually Simple Remote Voting against Tiny Tyrants |
35 | Hassan Qahur Al Mahri, Leonie Simpson, Bartlett Harry, Ed Dawson and Kenneth Koon-Ho Wong. Forgery Attacks on ++AE Authenticated Encryption Mode |
166 | Vishesh Bhartiya and Leonie Simpson. Initialisation Flaws in the A5-GMR-1 Satphone Encryption Algorithm |
129 | Nikki Robins, Trish Williams and Krishnun Sansurooah. I know what you did last summer... An Investigation into Remnant Data on USB Storage Devices Sold in Australia in 2015. |
81 | Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson and Josef Pieprzyk. Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN |
122 | Arran Stewart, Rachel Cardell-Oliver and Rowan Davies. Fine-grained classification of side-effect free methods in real-world Java code and applications to software security |
159 | Masood Mansoori, Ian Welch and Ebrahim Hashemi. Measurement of IP and Network Tracking Behaviour of Malicious Websites |
124 | Nicholas Rodofile, Kenneth Radke and Ernest Foo. DNP3 Network Scanning and Reconnaissance For Critical Infrastructure |
25 | Xu Huang, Muhammad R. Ahmed, Raul Fernandez Rojas, Hongyan Cui and Mohammed Aseeri. Effective Algorithm for Protecting WSNs from Internal Attacks in Real-Time |
134 | Bonnie Gambhir and Udaya Parampalli. Personally Controlled & Privacy Preserving Medication Management System |
96 | Ar Kar Kyaw, Pulin Agrawal and Brian Cusack. Wi-Pi: A Study of WLAN Security in Auckland CBD |
121 | Joseph Alley and Josef Pieprzyk. State Recovery Attacks against p-Cipher |
132 | Farhad Moghimifar and Douglas Stebila. Predicting TLS performance from key exchange performance |
Asia-Pacific Conference on Conceptual Modelling (APCMM)
55 |
John Wondoh, Georg Grossmann and Markus Stumptner. Utilising Bitemporal Information for Business Process Contingency Management |
67 |
Felix Burgstaller, Dieter Steiner, Bernd Neumayr, Michael Schrefl and Eduard Gringinger. Using a Model-driven, Knowledge-based Approach to Cope with Complexity in Filtering of Notices to Airmen |
Australasian User Interface Conference (AUIC)
20 | Phi Giang Pham and Mao Lin Huang. MCquery: Interactive Visual Query of Relational Data with Coordinating Context Displays |
43 | Masood Masoodian, Saturnino Luz and David Kavenga. nu-view: A Visualization System for Collaborative Co-located Analysis of Geospatial Disease Data |
15 | Dale Patterson. 3D Spirals, Bubbles and Sliders - Setting Range Values in Multi-User 3D Environments |
14 | Benjamin Shelton and Keith Nesbitt. The Aesthetic Awareness Display: a New Design Pattern for Ambient Information Systems |
27 | Kurt Geihs and Christoph Evers. User Intervention in Self-Adaptive Context-Aware Applications |
4 | Steven Wark and Marcin Nowina-Krowicki. Generating Multimedia Narrative For Virtual Humans |
98 | Carolyn Seton and Raina Mason. Decreasing the Digital Divide - Analysing the UI requirements of older Australians |
110 | Geoffrey Hookham, Keith Nesbitt and Frances Kay-Lambkin. Comparing Usability and Engagement between a Serious Game and a Traditional Online Program |
135 | Kartik Andalam, Kirushi Arunthavasothy, Raoul D'cunha, Shreya Shah, Andrew Luxton-Reilly and Beryl Plimmer. Surface Air Hockey: A Step Towards Smart Tangibles |
Australasian Web Conference (AWC)
16 |
Ross J. Bille, Yuqing Lin and Stephan K. Chalup. RTCSS: A Framework for Developing Real-Time Peer-to-Peer Web Applications |
97 |
Feiyan Yu, Geoff West, Lesley Arnold, David McMeekin and Simon Moncrieff. Automatic Geospatial Data Conflation Using Semantic Web Technologies |
153 |
Martin Stabauer, Georg Grossmann and Markus Stumptner. State of the Art in Knowledge Extraction from Online Polls |
Australasian Workshop on Health Informatics and Knowledge Management (HIKM)
133 | Daniel Grunwell and Tony Sahama. Delegation of access in an Information Accountability Framework for eHealth |
79 | Alofi Black and Tony Sahama. Chronicling the patient journey: Co-creating Value with Digital Healthcare Ecosystems |
151 | Rosemary Sayvong and Joanne Curry. Patient Journey Modelling as a Policy Mapping Method: Enhancing the Understanding of Policy Analysis |
89 | Golenur Huq, Jim Basilakis and Anthony Maeder. Evaluation of Tri-axial accelerometery data of falls for elderly through smart phone |
71 | Lindsay Shaw, Burkhard Wuensche, Christof Lutteroth, Romain Tourrel, Stefan Marks, Jude Buckley and Paul Corballis. Design of a Virtual Trainer for Exergaming |
26 | Sarita Pais, Dave Parry, Elaine Rush and Janet Rowan. Data Integration for Mobile Wellness Apps to Support Treatment of GDM |
112 | I-Yang Huang, Mark Watkin, Ian Warren and Andrew Meads. Eye Atlas: A Resource for Ophthalmology Students |
163 | Arif Khan, Shahadat Uddin and Uma Srinivasan. Adapting Graph Theory and Social Network Measures on Healthcare Data - a New Framework to Understand Chronic Disease Progression |
17 | Ivan Rivera, Jim Warren and James Curran. Quantifying Mood, Content and Dynamics of Health Forums |
Interactive Entertainment (IE)
38 | William Goddard, Jayden Garner and Mads Moller Jensen. Designing for Social Play in Co-located Mobile Games |
11 | Chen Si, Yusuf Pisan and Chek Tien Tan. Understanding Players' Map Exploration Styles |
90 | Daniel Hickmott, Shamus Smith, Ross Bille, Elizabeth Burd, Liz Stephens and Erica Southgate. Building Apostrophe Power: Lessons Learnt for Serious Games Development |
126 | Mitchell Metcalfe, Brendan Annable, Monica Olejniczak and Stephan K. Chalup. A Study on Detecting Three-Dimensional Balls using Boosted Classifiers |
24 | Karen Blackmore, William Coppins and Keith Nesbitt. Using Startle Reflex to Compare Playing and Watching in a Horror Game |
52 | Scott Donaldson. Towards a Typology of Metagames |
158 | Daniel Wheat, Martin Masek, Peng Chiou Lam and Philip Hingston. Modeling Perceived Difficulty in Game Levels |
77 | Geoffrey Hookham, Frances Kay-Lambkin, Karen Blackmore and Keith Nesbitt. Using Startle Probe to Compare Affect and Engagement between a Serious Game and an Online Intervention Program |
73 | Dale Patterson. Interactive 3D Web Applications for Visualization of World Health Organization Data |
95 | Jan Kruse, Ricardo Sosa and Andy M. Connor. Procedural Urban Environments for FPS Games |