The ACSW papers are now available via the ACM DL. Please select the "Table of Contents" tab on the right to see the papers.

Program At A Glance

TUESDAY 2nd FEBRUARY 2016

STREAM 1

STREAM 2

Haydon-Allen G52
(Building 22)

Haydon-Allen G53
(Building 22)

09:00 - 17:00

CORE Heads and Profs meeting

Includes breaks and lunch

ACE Doctoral consortium

Includes breaks and lunch

17:30 - 19:30

WELCOME RECEPTION
The Allan Barton Forum, Level 2 CBE (Building 26C)

19:00 - 21:00

CORE HEADS AND PROFS DINNER
Blu Ginger



WEDNESDAY 3rd FEBRUARY 2016

08:30 - 09:00

CONFERENCE OPEN + CORE AWARDS
Haydon-Allen Lecture Theatre (Building 23)

09:00 - 10:00

PLENARY
Judy Kay
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

TechLauncher
+
Exhibition

Haydon-Allen G52 (Building 22)

ACALCI 2016

P.A.P Moran G08 (Building 26B)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

SESSION 1
10:00 - 11:15

ACSC1

***

HIKM1

ACE1

**
***

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AISC1

***

HIKM2

AUIC1

**
***

13:00 - 14:00

LUNCH

SESSION 3
14:00 - 15:15

IE1

***

ACE2

HIKM3

**
***

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00

IE + ACSC2

ACE3

AWC

19:00 - 21:00

CONFERENCE DINNER
Old Canberra House



THURSDAY 4th FEBRUARY 2016

09:00 - 10:00

PLENARY
Kerry Taylor
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

Exhibition

Haydon-Allen G52 (Building 22)

ACALCI 2016

P.A.P Moran G08 (Building 26B)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

SESSION 1
10:00 - 11:15

IE2

ACE4

AISC2

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AUIC2

ACE5

ACSC3

13:00 - 14:00

LUNCH
+
ACSW CHAIRS WORKING MEETING
Haydon-Allen G53 (Building 22)

SESSION 3
14:00 - 15:15

IE3

ACE6

AISC3

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00

AUIC3

ACE7

ACSC4



FRIDAY 5th FEBRUARY 2016

09:00 - 10:00

PLENARY
Geraldine Torrisi-Steele
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

STREAM 4

Exhibition

Haydon-Allen G52 (Building 22)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

P.A.P Moran G08 (Building 26B)

SESSION 1
10:00 - 11:15

AISC4

ACSC5

ACE workshop

Developing Computational Thinking with Sprego

Includes break

ACE workshop

Benchmarking and Curriculum Improvement for the Computing Disciplines

Includes break

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AISC + APCMM

13:00 - 14:00

LUNCH

SESSION 3
14:00 - 15:15

ACE workshop

Using Cognitive Load Theory to Improve Troublesome Courses

Includes break

W3C Workshop

A partial tutorial and history of CSS, with discussion

Includes break

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00




Technical Program

WEDNESDAY 3rd FEBRUARY 2016

08:30 - 09:00

CONFERENCE OPEN + CORE AWARDS
Haydon-Allen Lecture Theatre (Building 23)

09:00 - 10:00

PLENARY
Judy Kay
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

TechLauncher
+
Exhibition

Haydon-Allen G52 (Building 22)

ACALCI 2016

P.A.P Moran G08 (Building 26B)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

SESSION 1
10:00 - 11:15

ACSC1

***

HIKM1

ACE1

**
***

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AISC1

***

HIKM2

AUIC1

**
***

13:00 - 14:00

LUNCH

SESSION 3
14:00 - 15:15

IE1

***

ACE2

HIKM3

**
***

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00

IE + ACSC2

ACE3

AWC

19:00 - 21:00

CONFERENCE DINNER
Old Canberra House



PLENARY: A Human-Centred View of Big Personal Data: Scrutable User Models for Privacy and Control

Speaker: Judy Kay (The University of Sydney, Australia)

Abstract: My work aims to enable people to harness, control and manage their big personal data. To really achieve this, many sub-disciplines of computer science need to take a human-centred perspective. People are generating vast, and growing, collections of personal data, captured by rich personal digital ecosystems of devices. Users explicitly store some data but systems also capture the user's digital footprints, ranging from simple clicks and touches, to data from body-worn devices, to images, audio and video. This personal data resides in a quite bewildering range of places, from personal devices to cloud stores, in multitudes of silos. Big personal data may be of modest size compared with big scientific data, but people consider their data stores as big, because they are complex and hard to control and harness. A driving goal for my research has been to tackle the challenges of big personal data by creating infrastructures, representations and interfaces that enable a user to scrutinize and control their personal data in a scrutable user model. This talk will present examples of that research including diverse roles for personalisation from teaching to online dating and in novel interfaces for interactive tables and walls. It will also highlight directions for human-centred approaches to ensure privacy and control of big personal data.

Bio: Judy Kay is Professor of Computer Science. She leads the Human Centred Technology Research Cluster, one of three priority clusters in the Faculty of Engineering and IT at the University of Sydney. Her own lab, CHAI, Computer Human Adapted Interaction Research Group aims to create new technologies for human computer interaction (HCI). Her personalisation research has created the Personis user modelling framework. Personis models are distinctive in that they were designed to be scrutable, because interfaces enable the user to scrutinise their user model and personalisation processes based on it. Her interface research has created the Cruiser Natural User Interaction (NIU) software framework. This provides new ways for people to make use of large interactive tabletops and wall displays. By mining the digital footprints of such interaction, this research is creating new ways for people to learn to collaborate, and to learn and work more collaboratively.

Her research has been commercialised and deployed and she has extensive publications, in venues such as the conferences Pervasive, Computer Human Interaction (CHI), User Modeling (UM, AH, UMAP) and journals, such as IEEE Transactions on Knowledge and Data Engineering, International Journal of Artificial Intelligence in Education, User Modeling and User-Adapted Interaction, Personal and Ubiquitous Computing, Communications of the ACM, Computer Science Education.


Session 1: 10:00 - 11:15

ACSC 1 Session Chair: Rajeev Gore

10:00

13

Daniel Alarcon and Rajeev Gore. Efficient Error Localisation and Imputation for Real-World Census Databases Using SMT
Best ACSC paper

10:25

5

Vincent Mwintieru Nofong. EDTrend: A Methodology for Trend Prediction with Emerging and Decaying Patterns
Best ACSC student paper

10:50

114

Nathaniel Baxter, Geoffrey Chu and Peter J Stuckey. Symmetry Declarations for MiniZinc

HIKM 1 Session Chair: Anthony Maeder

10:00

133

Daniel Grunwell and Tony Sahama. Delegation of access in an Information Accountability Framework for eHealth

10:25

79

Alofi Black and Tony Sahama. Chronicling the patient journey: Co-creating Value with Digital Healthcare Ecosystems

10:50

151

Rosemary Sayvong and Joanne Curry. Patient Journey Modelling as a Policy Mapping Method: Enhancing the Understanding of Policy Analysis

ACE 1 Session Chair: Matt Butler

10:00

105

Vincent Gramoli, Michael Charleston, Bryn Jeffries, Irena Koprinska, Martin McGrane, Anastasios Viglas, Kalina Yacef and Alex Radu. Mining Autograding Data in Computer Science Education

10:25

76

Shaymaa Sorour and Tsunenori Mine. Exploring Students' Learning Attributes in Consecutive Lessons to Improve Prediction Performance

10:50

140

Simon and Judy Sheard. Academic integrity and computing assessments Best ACE paper


Session 2: 11:45 - 13:00

AISC 1 Session Chair: Xun Yi

11:45

72

Thomas Haines and Xavier Boyen. VOTOR: Conceptually Simple Remote Voting against Tiny Tyrants
Best AISC paper

12:10

35

Hassan Qahur Al Mahri, Leonie Simpson, Bartlett Harry, Ed Dawson and Kenneth Koon-Ho Wong. Forgery Attacks on ++AE Authenticated Encryption Mode

12:35

166

Vishesh Bhartiya and Leonie Simpson. Initialisation Flaws in the A5-GMR-1 Satphone Encryption Algorithm

HIKM 2 Session Chair: Trish Willaims

11:45

89

Golenur Huq, Jim Basilakis and Anthony Maeder. Evaluation of Tri-axial accelerometery data of falls for elderly through smart phone

12:10

71

Lindsay Shaw, Burkhard Wuensche, Christof Lutteroth, Romain Tourrel, Stefan Marks, Jude Buckley and Paul Corballis. Design of a Virtual Trainer for Exergaming
Best HIKM student paper

12:35

26

Sarita Pais, Dave Parry, Elaine Rush and Janet Rowan. Data Integration for Mobile Wellness Apps to Support Treatment of GDM

AUIC 1 Session Chair: Andrew Luxton-Reilly

11:45

20

Phi Giang Pham and Mao Lin Huang. MCquery: Interactive Visual Query of Relational Data with Coordinating Context Displays

12:10

43

Masood Masoodian, Saturnino Luz and David Kavenga. nu-view: A Visualization System for Collaborative Co-located Analysis of Geospatial Disease Data

12:35

15

Dale Patterson. 3D Spirals, Bubbles and Sliders - Setting Range Values in Multi-User 3D Environments
Best AUIC paper


Session 3: 14:00 - 15:15

IE 1 Session Chair: Karen Blackmore

14:00

38

William Goddard, Jayden Garner and Mads Moller Jensen. Designing for Social Play in Co-located Mobile Games
Best IE paper

14:25

11

Chen Si, Yusuf Pisan and Chek Tien Tan. Understanding Players' Map Exploration Styles

14:50

90

Daniel Hickmott, Shamus Smith, Ross Bille, Elizabeth Burd, Liz Stephens and Erica Southgate. Building Apostrophe Power: Lessons Learnt for Serious Games Development

ACE 2 Session Chair: Julie Prior

14:00

83

Wen Chin Hsu and Scott Plunkett. Attendance and Grades in Learning Programming Classes

14:25

123

Rohini Balapumi, Brian R. von Konsky, Ashley Aitken and David A. McMeekin. Factors Influencing University Students' Self-Regulation of Learning: An Exploratory Study
Best ACE student paper

14:50

91

Matthew Butler, Jane Sinclair, Michael Morgan and Sara Kalvara. Comparing International Indicators of Student Engagement for Computer Science

HIKM 3 Session Chair: Tony Sahama

14:00

112

I-Yang Huang, Mark Watkin, Ian Warren and Andrew Meads. Eye Atlas: A Resource for Ophthalmology Students

14:25

163

Arif Khan, Shahadat Uddin and Uma Srinivasan. Adapting Graph Theory and Social Network Measures on Healthcare Data - a New Framework to Understand Chronic Disease Progression

14:50

17

Ivan Rivera, Jim Warren and James Curran. Quantifying Mood, Content and Dynamics of Health Forums
Best HIKM paper


Session 4: 15:45 - 17:00

IE + ACSC 2 Session Chair: Karen Blackmore

15:45

126

Mitchell Metcalfe, Brendan Annable, Monica Olejniczak and Stephan K. Chalup. A Study on Detecting Three-Dimensional Balls using Boosted Classifiers (IE paper)

88

Nehad Albadri, Richard Watson and Stijn Dekeyser. TreeTags: Bringing Tags to the Hierarchical File System

16:10

84

Jack Parry, Daniel Hunter, Kenneth Radke and Colin Fidge. A Network Forensics Tool for Precise Data Packet Capture and Replay in Cyber-Physical Systems

ACE 3 Session Chair: Simon

15:45

101

Julia Prior, Samuel Ferguson and John Leaney. Reflection is Hard: Teaching And Learning Reflective Practice in a Software Studio

16:10

49

Michelle Craig and Andrew Petersen. Student Difficulties with Pointer Concepts in C

AWCSession Chair: Kerry Taylor

15:45

16

Ross J. Bille, Yuqing Lin and Stephan K. Chalup. RTCSS: A Framework for Developing Real-Time Peer-to-Peer Web Applications

16:10

97

Feiyan Yu, Geoff West, Lesley Arnold, David McMeekin and Simon Moncrieff. Automatic Geospatial Data Conflation Using Semantic Web Technologies

16:35

153

Martin Stabauer, Georg Grossmann and Markus Stumptner. State of the Art in Knowledge Extraction from Online Polls


THURSDAY 4TH FEBRUARY 2016

09:00 - 10:00

PLENARY
Kerry Taylor
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

Exhibition

Haydon-Allen G52 (Building 22)

ACALCI 2016

P.A.P Moran G08 (Building 26B)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

SESSION 1
10:00 - 11:15

IE2

ACE4

AISC2

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AUIC2

ACE5

ACSC3

13:00 - 14:00

LUNCH
+
ACSW CHAIRS WORKING MEETING
Haydon-Allen G53 (Building 22)

SESSION 3
14:00 - 15:15

IE3

ACE6

AISC3

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00

AUIC3

ACE7

ACSC4


PLENARY: Semantic Sensor Networks: The Internet of Things needs the Web of Data

Speaker: Kerry Taylor, Chair W3C/OGC Spatial Data on the Web Working Group

Abstract: Gartner said in December that smart cities will use 1.6 billion connected things in 2016 rising to 3.3 billion in 2018. Large scale sensor network systems are not only features of cities and consumer products; but also of the interlinked industries of agriculture, manufacturing, food and health care. The AIOTI alliance of the European Commission concluded in November that “The biggest challenge will be to overcome the fragmentation of vertically-oriented closed systems, architectures and application areas and move towards horizontal open systems and platforms that support multiple applications.” This reflects an environment where a great number of industry alliances and SDOs have formed with a vertical silo approach for service and data interoperability.

On the other hand, ontologies founded on description logic are one of the few success stories for decades of research in knowledge representation and are now standardised and widely used for horizontal data interoperability, in the framework called the Semantic Web or the Web of Data. Formal reasoning is at the heart of a growing number of deployed tools and applications for data interoperability within enterprises and across government.

The Semantic Sensor Networks ontology was originally developed by a collaboration hosted by the W3C in 2009, to describe aspects of sensor networks and sensor data that is needed for loosely-connected interoperability and interpretation at a level above communications networking. The ontology has now entered the standards track of the W3C and OGC through the joint Spatial Data on the Web Working Group. In this talk I will discuss the role of ontologies in the developing Internet of Things and my hopes for the SSN ontology in particular.

Bio: Kerry joined the Australian National University four weeks ago. For the previous six months she was working as a specialist at the Australian Bureau of Statistics after 20 years at CSIRO as a research scientist in the division now known as data61. Her research has focused on data and system integration in multidisciplinary contexts, and she has been working with semantic and sensor systems for at least ten years now. She has also worked as an IT professional in the consulting, publishing, and education industries and government.

Kerry holds a BSc Hons in Computer Science from UNSW 1983 and a PhD in Computer Science and Information Technology from the ANU in 1996. She is a Visiting Reader at the University of Surrey.


Session 1: 10:00 - 11:15

IE 2 Session Chair: Yusuf Pisan

10:00

24

Karen Blackmore, William Coppins and Keith Nesbitt. Using Startle Reflex to Compare Playing and Watching in a Horror Game

10:25

52

Scott Donaldson. Towards a Typology of Metagames

10:50

158

Daniel Wheat, Martin Masek, Peng Chiou Lam and Philip Hingston. Modeling Perceived Difficulty in Game Levels

ACE 4 Session Chair: Raina Mason

10:00

41

Donna Teague, Colin Fidge and Xu Yue. Combining Unsupervised and Invigilated Assessment of Introductory Programming

10:25

109

Sam Kavanagh and Andrew Luxton-Reilly. Rubrics used in Peer Assessment

10:50

115

Teemu Rajala, Erkki Kaila, Rolf Linden, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso and Tapio Salakoski. Automatically assessed electronic exams in programming courses

AISC 2 Session Chair: Xu Huang

10:00

129

Nikki Robins, Trish Williams and Krishnun Sansurooah. I know what you did last summer... An Investigation into Remnant Data on USB Storage Devices Sold in Australia in 2015.

10:25

81

Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson and Josef Pieprzyk. Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN

10:50

122

Arran Stewart, Rachel Cardell-Oliver and Rowan Davies. Fine-grained classification of side-effect free methods in real-world Java code and applications to software security


Session 2: 11:45 - 13:00

AUIC 2 Session Chair: Thuong Hoang

11:45

14

Benjamin Shelton and Keith Nesbitt. The Aesthetic Awareness Display: a New Design Pattern for Ambient Information Systems

12:10

27

Kurt Geihs and Christoph Evers. User Intervention in Self-Adaptive Context-Aware Applications

12:35

4

Steven Wark and Marcin Nowina-Krowicki. Generating Multimedia Narrative For Virtual Humans

ACE 5 Session Chair: Judy Sheard

11:45

10

Carbone Angela and Margaret Hamilton. Pizza with university ICT students: What do students expect employers want?

12:10

100

Matt Stevens and Richard Norman. Industry Expectations of Soft Skills in IT Graduates

12:35

139

Phillipa Sturgess, Michael Cowling and Michelle Gray. Unpacking 'Digital Competency': Exploring the Pre-Existing Skills of Enabling Education Students

ACSC 3 Session Chair: Bob Kummerfeld

11:45

22

Sung Eun Bae, Tong-Wook Shinn and Tadao Takaoka. An Efficient Parallel Algorithm for the Maximum Convex Sum Problem

12:10

87

Wing-Kai Hon, Ton Kloks and Hsiang-Hsuan Liu. On the $P_3$-Convexity of Some Classes of Graphs with Few $P_4$s and Permutation Graphs

12:35

116

Mahdi Parsa and Vlad Estivill-Castro. Hardness and tractability of detecting connected communities


Session 3: 14:00 - 15:15

IE 3 Session Chair: Martin Masek

14:00

77

Geoffrey Hookham, Frances Kay-Lambkin, Karen Blackmore and Keith Nesbitt. Using Startle Probe to Compare Affect and Engagement between a Serious Game and an Online Intervention Program

14:25

73

Dale Patterson. Interactive 3D Web Applications for Visualization of World Health Organization Data

14:50

95

Jan Kruse, Ricardo Sosa and Andy M. Connor. Procedural Urban Environments for FPS Games

ACE 6 Session Chair: Margaret Hamilton

14:00

6

Ovidiu Noran. On Gamification in Action Learning

14:25

8

Patricia Haden, Joy Gasson, Krissi Wood and Dale Parsons. Can You Learn To Teach Programming in Two Days?

14:50

46

Nazish Khan and Andrew Luxton-Reilly. Is Computing for Social Good the Solution to Closing the Gender Gap in Computer Science?

AISC 3 Session Chair: Leonie Simpson

14:00

159

Masood Mansoori, Ian Welch and Ebrahim Hashemi. Measurement of IP and Network Tracking Behaviour of Malicious Websites

14:25

124

Nicholas Rodofile, Kenneth Radke and Ernest Foo. DNP3 Network Scanning and Reconnaissance For Critical Infrastructure

14:50

25

Xu Huang, Muhammad R. Ahmed, Raul Fernandez Rojas, Hongyan Cui and Mohammed Aseeri. Effective Algorithm for Protecting WSNs from Internal Attacks in Real-Time


Session 4: 15:45 - 17:00

AUIC 3 Session Chair: Thuong Hoang

15:45

98

Carolyn Seton and Raina Mason. Decreasing the Digital Divide - Analysing the UI requirements of older Australians

16:10

110

Geoffrey Hookham, Keith Nesbitt and Frances Kay-Lambkin. Comparing Usability and Engagement between a Serious Game and a Traditional Online Program

16:35

135

Kartik Andalam, Kirushi Arunthavasothy, Raoul D'cunha, Shreya Shah, Andrew Luxton-Reilly and Beryl Plimmer. Surface Air Hockey: A Step Towards Smart Tangibles

ACE 7 Session Chair: SIGCSE Chair

15:45

SIGCSE meeting

ACSC 4 Session Chair: Marshima Mohd Rosli

15:45

63

Leila Eskandari, Zhiyi Huang and David Eyers. P-Scheduler: Adaptive Hierarchical Scheduling in Apache Storm

16:10

59

Sarawat Anam, Yang Sok Kim, Byeong Ho Kang and Qing Liu. Adapting A Knowledge-based Schema Matching System for Ontology Mapping

16:35

80

Marshima Mohd Rosli, Ewan Tempero and Andrew Luxton-Reilly. What is in our datasets? Describing a structure of datasets.


FRIDAY 5th FEBRUARY 2016

09:00 - 10:00

PLENARY
Geraldine Torrisi-Steele
Haydon-Allen Lecture Theatre (Building 23)

STREAM 1

STREAM 2

STREAM 3

STREAM 4

Exhibition

Haydon-Allen G52 (Building 22)

Haydon-Allen Lecture Theatre (Building 23)

Haydon-Allen G53 (Building 22)

P.A.P Moran G07 (Building 26B)

P.A.P Moran G08 (Building 26B)

SESSION 1
10:00 - 11:15

AISC4

ACSC5

ACE workshop

Developing Computational Thinking with Sprego

Includes break

ACE workshop

Benchmarking and Curriculum Improvement for the Computing Disciplines

Includes break

11:15 - 11:45

MORNING TEA

SESSION 2
11:45 - 13:00

AISC + APCMM

13:00 - 14:00

LUNCH

SESSION 3
14:00 - 15:15

ACE workshop

Using Cognitive Load Theory to Improve Troublesome Courses

Includes break

W3C Workshop

A partial tutorial and history of CSS, with discussion

Includes break

15:15 - 15:45

AFTERNOON TEA

SESSION 4
15:45 - 17:00


PLENARY: Supporting students' development of metacognition and problem solving skills

Speaker: Geraldine Torrisi-Steele

Abstract: The importance of metacognition and problem solving skills in academic achievement is well recognised. However, even in higher education students often lack academic metacognitive capacities. Now more than ever, we are in a position where it is crucial that we refocus on these skills. In talking about lifelong learning, graduate attributes and graduates that are "future proof" we must pay explicit attention to supporting the development of such skills.

Teaching large first year introduction to coding classes within information technology and multimedia degree programs poses some challenges. Students' knowledge of, and interest in, coding ranges from `I've never written a single line of code; coding is not my thing', to `I've already written a major application; coding is my life', to everything in between. Typically the majority of students in my classes have very little or no understanding of coding. Assessment performance, course satisfaction and pass rates can be `very average'. Informal and formal data gathered from these classes indicates that poorly developed metacognitive capacities is a major contributing factor to students' lack of success in such courses.

In effort to place much-needed emphasis on metacognition and problem solving skills, and in order to open some discussion, I use the case of one particularly challenging course to share experiences, strategies and approaches to support students' growth in metacognition and problem solving skills in introductory coding courses.

Bio: Geraldine Torrisi-Steele is a senior lecturer within the School of Information and Communication Technology at Griffith University, where she teaches undergraduate courses within the multimedia and information technology degree programs. Her background in secondary science education and in the design and development of interactive e-learning, has precipitated a strong interest in learning and teaching, the user experience and user interface design design, and the application of digital media to educational contexts.


Session 1: 10:00 - 11:15

AISC 4 Session Chair: Xu Huang

10:00

134

Bonnie Gambhir and Udaya Parampalli. Personally Controlled & Privacy Preserving Medication Management System

10:25

96

Ar Kar Kyaw, Pulin Agrawal and Brian Cusack. Wi-Pi: A Study of WLAN Security in Auckland CBD

10:50

121

Joseph Alley and Josef Pieprzyk. State Recovery Attacks against p-Cipher

ACSC 5 Session Chair: Vlad Estivill-Castro

10:00

42

Yang Yu, Hui Ma and Mengjie Zhang. A Genetic Programming Approach to Distributed Execution of Data-Intensive Web Service Compositions

10:25

36

Maryam Golchin and Alan Wee-Chung Liew. Bicluster Detection using Strength Pareto Front Evolutionary Algorithm

10:50

53

Victor W. Chu, Raymond Wong, Fang Chen, Ivan Ho and Joe Lee. Market-sentiment Boosted Predictions on Multi-type Time-Series


Session 2: 11:45 - 13:00

AISC + APCMMSession Chair: Markus Stumptner

11:45

132

Farhad Moghimifar and Douglas Stebila. Predicting TLS performance from key exchange performance

12:10

55

John Wondoh, Georg Grossmann and Markus Stumptner. Utilising Bitemporal Information for Business Process Contingency Management

12:35

67

Felix Burgstaller, Dieter Steiner, Bernd Neumayr, Michael Schrefl and Eduard Gringinger. Using a Model-driven, Knowledge-based Approach to Cope with Complexity in Filtering of Notices to Airmen


ACE Workshops

Developing computational thinking with Sprego

Friday 5th February 10am-1pm

Maria Csernoch, Faculty of Informatics, University of Debrecen, Hungary, csernoch.maria@inf.unideb.hu

Abstract:
Sprego is a deep approach problem solving method in spreadsheet environments, and as such does not apply the popular but ineffective surface approach methods. The main characteristics of Sprego is that it uses as few general purpose functions as possible and based on these functions users can build multilevel formulas to solve real world problems. In this approach the focus is on the problem, instead of the technical and coding details. Relying on the functional language of spreadsheets, Sprego can serve as an introductory language to high level programming languages and as the ultimate language of end-users who do not want to be professional programmers. The method requires no more background knowledge than the concept of function from Mathematics, so it can be taught at various levels of education. Teachers from primary to tertiary education and end-users from any subject are welcomed at the workshop. We introduce the method, present and solve problems, with which we can demonstrate how the students' computational thinking, algorithmic and debugging skills can be developed in spreadsheet environments with real world problems based on authentic tables.

Expected Outcomes:
The participant can learn the core of the method, how to solve problems with a concept-based approach in spreadsheets and experience the hindrance of the widely accepted surface approach methods. We can share ideas how students would benefit the most from this approach, we can collect unique solutions to the presented problems, and ideas for further problems and sources for improving Sprego.

Equipment Needs:
participants are required to bring laptops with Excel or OpenOffice, LibreOffice Calc

Benchmarking and Curriculum Improvement for the Computing Disciplines

Friday 5th February 10am-1pm

Chris Johnson, Executive Officer, ACDICT

Abstract:
The workshop will help Associate Deans (L&T) in Schools of computing and information systems, and other educational developers, to meet peers and develop relationships that will be of use in doing benchmarking, and plan how to implement review processes that are workload-efficient and effective Benchmarking the standard of degrees is a challenge to disciplines like computing in all universities. The publication of Threshold Learning Standards for the broad academic disciplines (Engineering and ICT, in our case) gives sub-disciplines the opportunity to refine standards for their own specialisation, and re-examine their curricula and their development and review processes. The recently tabled Australian Government Higher Education Framework has emphasis on regular comparator review, which brings standards into consideration as the basis for benchmarking. Some of the pressure to ensure graduate standards also comes from employers, and from tax-payers as funders of university education. An effective peer review process has to satisfy students, employers (collectively as industry), academics, politicians, and regulators. The Threshold Standards are very broad and long term; the immediate needs of industry are often expressed narrowly and for the short-term. Academics often draw on their own long educational experience for ideas of content, measures, and approaches to teaching. Academic planners and leaders need to know these conflicting requirements and how to steer between them to benefit Schools and students.

Using Cognitive Load Theory to improve troublesome courses

Friday 5th February 2-5pm

Dr Raina Mason (Southern Cross University)

Carolyn Seton (Southern Cross University)

Abstract:
Cognitive Load Theory (CLT) focuses on human cognitive architecture; the concepts of long term and working memory and their interplay. CLT has been successfully applied to the design of instructional materials for technical areas, leading to increased student learning. Principles and techniques derived from CLT are usually applied to individual topics or sub- topics of content. Our approach looks at whole-of-course design, as well as examining individual instructional materials. Participants in the workshop will be taken through a case study; and then introduced to the Cognitive Assistance Factor Evaluation (CAFE') toolkit. CAFE' is a new web-based course evaluation toolkit for use by developers and academics, based on principles and techniques from CLT. The toolkit will assist in identifying potential existing weaknesses and propose interventions that are successful at improving courses. It also provides relevant links to research on each principle and technique. This workshop will be particularly suited to those participants who have responsibility for a course which contains novices, or find that some of their students disengage early with the material, "learn" material one day but are unable to do near transfer problems afterwards, or a course that currently has a relatively high attrition or failure rate.

Expected Outcomes:
Participants will be introduced to a case study of a successful redevelopment, will be given access to the CAFE' toolkit, and will identify some strategies for improving their own course. Anonymised data will also be used as a pilot for a larger research project on the usage of the toolkit for computer science/IT education and usage in other disciplines.

Equipment Needs:
Participants will require a laptop or tablet, and web access. Participants should also bring along course(/paper/unit) outlines/material or materials from a poorly performing topic or section within a course, to review during the workshop.

W3C Workshops

A partial tutorial and history of CSS, with discussion

Friday 5th February 2-5pm

Bert Bos (W3C)

Abstract:
CSS (Cascading Style Sheets) is the technology that allows Web authors to specify the layout of Web pages and apps. It is a standard made by W3C. The first parts were published already in 1996 and 1998, but new parts are still being added. In this workshop we'll look at some parts ("modules") of CSS, both older and recent ones, with excursions into how these modules were developed and why they are the way they are. The tutorial part is probably easiest to follow for people who know a little about CSS already, but the syntax is easy enough to pick up. The background information requires no prior knowledge and should be interesting for people who want to know how international standards are made in practice.... or want to help make them.

Expected Outcomes:
Participants interested in writing CSS style sheets will hopefully learn some new things about CSS. The presenter himself hopes to learn from the participants some fresh ideas about how to develop CSS further and how W3C can develop it most efficiently.

Equipment Needs:
No equipment needed, but if you bring a laptop (with a reasonably recent Web browser) you will be able to try some of the examples yourself.


Australasian Computing Education Conference (ACE)

105

Vincent Gramoli, Michael Charleston, Bryn Jeffries, Irena Koprinska, Martin McGrane, Anastasios Viglas, Kalina Yacef and Alex Radu. Mining Autograding Data in Computer Science Education

76

Shaymaa Sorour and Tsunenori Mine. Exploring Students' Learning Attributes in Consecutive Lessons to Improve Prediction Performance

140

Simon and Judy Sheard. Academic integrity and computing assessments

83

Wen Chin Hsu and Scott Plunkett. Attendance and Grades in Learning Programming Classes

123

Rohini Balapumi, Brian R. von Konsky, Ashley Aitken and David A. McMeekin. Factors Influencing University Students' Self-Regulation of Learning: An Exploratory Study

91

Matthew Butler, Jane Sinclair, Michael Morgan and Sara Kalvara. Comparing International Indicators of Student Engagement for Computer Science

101

Julia Prior, Samuel Ferguson and John Leaney. Reflection is Hard: Teaching And Learning Reflective Practice in a Software Studio

49

Michelle Craig and Andrew Petersen. Student Difficulties with Pointer Concepts in C

41

Donna Teague, Colin Fidge and Xu Yue. Combining Unsupervised and Invigilated Assessment of Introductory Programming

109

Sam Kavanagh and Andrew Luxton-Reilly. Rubrics used in Peer Assessment

115

Teemu Rajala, Erkki Kaila, Rolf Linden, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso and Tapio Salakoski. Automatically assessed electronic exams in programming courses

10

Carbone Angela and Margaret Hamilton. Pizza with university ICT students: What do students expect employers want?

100

Matt Stevens and Richard Norman. Industry Expectations of Soft Skills in IT Graduates

139

Phillipa Sturgess, Michael Cowling and Michelle Gray. Unpacking 'Digital Competency': Exploring the Pre-Existing Skills of Enabling Education Students

6

Ovidiu Noran. On Gamification in Action Learning

8

Patricia Haden, Joy Gasson, Krissi Wood and Dale Parsons. Can You Learn To Teach Programming in Two Days?

46

Nazish Khan and Andrew Luxton-Reilly. Is Computing for Social Good the Solution to Closing the Gender Gap in Computer Science?

Australasian Computer Science Conference (ACSC)

13

Daniel Alarcon and Rajeev Gore. Efficient Error Localisation and Imputation for Real-World Census Databases Using SMT

5

Vincent Mwintieru Nofong. EDTrend: A Methodology for Trend Prediction with Emerging and Decaying Patterns

114

Nathaniel Baxter, Geoffrey Chu and Peter J Stuckey. Symmetry Declarations for MiniZinc

88

Nehad Albadri, Richard Watson and Stijn Dekeyser. TreeTags: Bringing Tags to the Hierarchical File System

84

Jack Parry, Daniel Hunter, Kenneth Radke and Colin Fidge. A Network Forensics Tool for Precise Data Packet Capture and Replay in Cyber-Physical Systems

22

Sung Eun Bae, Tong-Wook Shinn and Tadao Takaoka. An Efficient Parallel Algorithm for the Maximum Convex Sum Problem

87

Wing-Kai Hon, Ton Kloks and Hsiang-Hsuan Liu. On the $P_3$-Convexity of Some Classes of Graphs with Few $P_4$s and Permutation Graphs

116

Mahdi Parsa and Vlad Estivill-Castro. Hardness and tractability of detecting connected communities

63

Leila Eskandari, Zhiyi Huang and David Eyers. P-Scheduler: Adaptive Hierarchical Scheduling in Apache Storm

59

Sarawat Anam, Yang Sok Kim, Byeong Ho Kang and Qing Liu. Adapting A Knowledge-based Schema Matching System for Ontology Mapping

80

Marshima Mohd Rosli, Ewan Tempero and Andrew Luxton-Reilly. What is in our datasets? Describing a structure of datasets.

42

Yang Yu, Hui Ma and Mengjie Zhang. A Genetic Programming Approach to Distributed Execution of Data-Intensive Web Service Compositions

36

Maryam Golchin and Alan Wee-Chung Liew. Bicluster Detection using Strength Pareto Front Evolutionary Algorithm

53

Victor W. Chu, Raymond Wong, Fang Chen, Ivan Ho and Joe Lee. Market-sentiment Boosted Predictions on Multi-type Time-Series

Australasian Information Security Conference (AISC)

72

Thomas Haines and Xavier Boyen. VOTOR: Conceptually Simple Remote Voting against Tiny Tyrants

35

Hassan Qahur Al Mahri, Leonie Simpson, Bartlett Harry, Ed Dawson and Kenneth Koon-Ho Wong. Forgery Attacks on ++AE Authenticated Encryption Mode

166

Vishesh Bhartiya and Leonie Simpson. Initialisation Flaws in the A5-GMR-1 Satphone Encryption Algorithm

129

Nikki Robins, Trish Williams and Krishnun Sansurooah. I know what you did last summer... An Investigation into Remnant Data on USB Storage Devices Sold in Australia in 2015.

81

Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson and Josef Pieprzyk. Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN

122

Arran Stewart, Rachel Cardell-Oliver and Rowan Davies. Fine-grained classification of side-effect free methods in real-world Java code and applications to software security

159

Masood Mansoori, Ian Welch and Ebrahim Hashemi. Measurement of IP and Network Tracking Behaviour of Malicious Websites

124

Nicholas Rodofile, Kenneth Radke and Ernest Foo. DNP3 Network Scanning and Reconnaissance For Critical Infrastructure

25

Xu Huang, Muhammad R. Ahmed, Raul Fernandez Rojas, Hongyan Cui and Mohammed Aseeri. Effective Algorithm for Protecting WSNs from Internal Attacks in Real-Time

134

Bonnie Gambhir and Udaya Parampalli. Personally Controlled & Privacy Preserving Medication Management System

96

Ar Kar Kyaw, Pulin Agrawal and Brian Cusack. Wi-Pi: A Study of WLAN Security in Auckland CBD

121

Joseph Alley and Josef Pieprzyk. State Recovery Attacks against p-Cipher

132

Farhad Moghimifar and Douglas Stebila. Predicting TLS performance from key exchange performance

Asia-Pacific Conference on Conceptual Modelling (APCMM)

55

John Wondoh, Georg Grossmann and Markus Stumptner. Utilising Bitemporal Information for Business Process Contingency Management

67

Felix Burgstaller, Dieter Steiner, Bernd Neumayr, Michael Schrefl and Eduard Gringinger. Using a Model-driven, Knowledge-based Approach to Cope with Complexity in Filtering of Notices to Airmen

Australasian User Interface Conference (AUIC)

20

Phi Giang Pham and Mao Lin Huang. MCquery: Interactive Visual Query of Relational Data with Coordinating Context Displays

43

Masood Masoodian, Saturnino Luz and David Kavenga. nu-view: A Visualization System for Collaborative Co-located Analysis of Geospatial Disease Data

15

Dale Patterson. 3D Spirals, Bubbles and Sliders - Setting Range Values in Multi-User 3D Environments

14

Benjamin Shelton and Keith Nesbitt. The Aesthetic Awareness Display: a New Design Pattern for Ambient Information Systems

27

Kurt Geihs and Christoph Evers. User Intervention in Self-Adaptive Context-Aware Applications

4

Steven Wark and Marcin Nowina-Krowicki. Generating Multimedia Narrative For Virtual Humans

98

Carolyn Seton and Raina Mason. Decreasing the Digital Divide - Analysing the UI requirements of older Australians

110

Geoffrey Hookham, Keith Nesbitt and Frances Kay-Lambkin. Comparing Usability and Engagement between a Serious Game and a Traditional Online Program

135

Kartik Andalam, Kirushi Arunthavasothy, Raoul D'cunha, Shreya Shah, Andrew Luxton-Reilly and Beryl Plimmer. Surface Air Hockey: A Step Towards Smart Tangibles

Australasian Web Conference (AWC)

16

Ross J. Bille, Yuqing Lin and Stephan K. Chalup. RTCSS: A Framework for Developing Real-Time Peer-to-Peer Web Applications

97

Feiyan Yu, Geoff West, Lesley Arnold, David McMeekin and Simon Moncrieff. Automatic Geospatial Data Conflation Using Semantic Web Technologies

153

Martin Stabauer, Georg Grossmann and Markus Stumptner. State of the Art in Knowledge Extraction from Online Polls

Australasian Workshop on Health Informatics and Knowledge Management (HIKM)

133

Daniel Grunwell and Tony Sahama. Delegation of access in an Information Accountability Framework for eHealth

79

Alofi Black and Tony Sahama. Chronicling the patient journey: Co-creating Value with Digital Healthcare Ecosystems

151

Rosemary Sayvong and Joanne Curry. Patient Journey Modelling as a Policy Mapping Method: Enhancing the Understanding of Policy Analysis

89

Golenur Huq, Jim Basilakis and Anthony Maeder. Evaluation of Tri-axial accelerometery data of falls for elderly through smart phone

71

Lindsay Shaw, Burkhard Wuensche, Christof Lutteroth, Romain Tourrel, Stefan Marks, Jude Buckley and Paul Corballis. Design of a Virtual Trainer for Exergaming

26

Sarita Pais, Dave Parry, Elaine Rush and Janet Rowan. Data Integration for Mobile Wellness Apps to Support Treatment of GDM

112

I-Yang Huang, Mark Watkin, Ian Warren and Andrew Meads. Eye Atlas: A Resource for Ophthalmology Students

163

Arif Khan, Shahadat Uddin and Uma Srinivasan. Adapting Graph Theory and Social Network Measures on Healthcare Data - a New Framework to Understand Chronic Disease Progression

17

Ivan Rivera, Jim Warren and James Curran. Quantifying Mood, Content and Dynamics of Health Forums

Interactive Entertainment (IE)

38

William Goddard, Jayden Garner and Mads Moller Jensen. Designing for Social Play in Co-located Mobile Games

11

Chen Si, Yusuf Pisan and Chek Tien Tan. Understanding Players' Map Exploration Styles

90

Daniel Hickmott, Shamus Smith, Ross Bille, Elizabeth Burd, Liz Stephens and Erica Southgate. Building Apostrophe Power: Lessons Learnt for Serious Games Development

126

Mitchell Metcalfe, Brendan Annable, Monica Olejniczak and Stephan K. Chalup. A Study on Detecting Three-Dimensional Balls using Boosted Classifiers

24

Karen Blackmore, William Coppins and Keith Nesbitt. Using Startle Reflex to Compare Playing and Watching in a Horror Game

52

Scott Donaldson. Towards a Typology of Metagames

158

Daniel Wheat, Martin Masek, Peng Chiou Lam and Philip Hingston. Modeling Perceived Difficulty in Game Levels

77

Geoffrey Hookham, Frances Kay-Lambkin, Karen Blackmore and Keith Nesbitt. Using Startle Probe to Compare Affect and Engagement between a Serious Game and an Online Intervention Program

73

Dale Patterson. Interactive 3D Web Applications for Visualization of World Health Organization Data

95

Jan Kruse, Ricardo Sosa and Andy M. Connor. Procedural Urban Environments for FPS Games