skip to main content
10.1145/2157136.2157182acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

Modeling how students learn to program

Published:29 February 2012Publication History

ABSTRACT

Despite the potential wealth of educational indicators expressed in a student's approach to homework assignments, how students arrive at their final solution is largely overlooked in university courses. In this paper we present a methodology which uses machine learning techniques to autonomously create a graphical model of how students in an introductory programming course progress through a homework assignment. We subsequently show that this model is predictive of which students will struggle with material presented later in the class.

References

  1. Booth, S. 1992. Learning to program: A phenomenographic perspective. Gothenburg, Sweden: Acta Universitatis Gothoburgensis.Google ScholarGoogle Scholar
  2. Bowman, M., Debray, S. K., & Peterson, L. L. 1993. Reasoning about naming systems. ACM Trans. Program. Lang. Syst. 15, 5 (Nov. 1993), 795--825. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bruce, C., Buckingham, L., Hynd, J., McMahon, C., Roggenkamp, M., & Stoodley, I. 2004. Ways of experiencing the act of learning to program: A phenomenographic study of introductory programming students at university. Journal of Information Technology Education, 3, 143--160.Google ScholarGoogle ScholarCross RefCross Ref
  4. Brusilovsky, Peter. 2000. Adaptive hypermedia: From intelligent tutoring systems to web-based education. LNCS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Conati, C., Gertner, A. S., VanLehn, K., & Druzdzel, M. J. 1997. On-line student modeling for coached problem solving using Bayesian networks. Proceedings of the 6th Int'l Conference on User Modeling (UM-96), 231--242.Google ScholarGoogle ScholarCross RefCross Ref
  6. Cristianini, N. & Shawe-Taylor, J. 2000. An introduction to support vector machines and other kernel-based learning methods. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cutting, D., Karger, D., Pedersen, J., & Tukey, J. 1992. Scatter/gather: A cluster-based approach to browsing large document collections. Proc. 15th SIGIR, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dempster, A.P., Laird, N.M., & Rubin, D.B. 1977. Maximum likelihood from incomplete data via the em algorithm. J. of the Royal Statistical Society B, 39 (1): 1--38.Google ScholarGoogle Scholar
  9. Gall, Harald et al. 2009. Change analysis with evolizer and changedistiller, Software, IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hoc, J-M. 1984. Do we really have conditional statements in our brains? Proceedings of the 2nd European Conference on Readings on Cognitive Ergonomics - Mind and Computers, G. van der Veer, M. Tauber, T. Green, and P. Gorny (Eds.), Springer-Verlag, London, UK, 92--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kaufman, L. and Rousseeuw, P.J. 1990. Finding groups in data: An introduction to cluster analysis, Wiley.Google ScholarGoogle Scholar
  12. Kessler, C. & Anderson, J. 1988. Learning flow of control: Recursive and iterative procedures. In {26}, 229--260.Google ScholarGoogle Scholar
  13. Kurland, D. & Pea, R. 1983. Children's mental models of recursive logo programs. Proceedings of the 5th Annual Conference of the Cognitive Science Society, NY, 1--5.Google ScholarGoogle Scholar
  14. Needleman S. & Wunsch C. 1970. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology.Google ScholarGoogle ScholarCross RefCross Ref
  15. Paine, Carina. 2001. How students learn to program: Observations of practical tasks completed. Proceedings of the IEEE International Conference on Advanced Learning Technologies (ICALT '01). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Parlante, N.,Wolfman, S., McCann, L., Roberts, E., Nevison, C., Motil, J., Cain, J., & Reges, S. 2006. Nifty assignments. SIGCSE Bull. 38, 1 (March 2006), 562--563. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Rabiner, L.R., & Juang, B,H. 1986. Introduction to hidden markov models. IEEE ASSP Magazine, 3(1):4--16, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  18. Rabiner, L.R., & Juang, B,H. 1993. Fundamentals of speech recognition. Prentice-Hall, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Reiser , B., Anderson , J., Farrell, R. 1985. Dynamic student modelling in an intelligent tutor for LISP programming, Proceedings of the 9th int'l joint conference on AI, 8--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Roberts, Eric. Karel Learns Java. Available from: http://www.stanford.edu/class/cs106a/cs106a_spring11/book/karel-the-robot-learns-java.pdf Accessed 9/1/2011.Google ScholarGoogle Scholar
  21. Sagar, Tobias et al. 2006. Detecting similar java classes using tree algorithms. Proceedings of the 2006 international workshop on mining software repositories (MSR '06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Salton, G., Wong, A., & Yang, C. S. 1975. A vector space model for automatic indexing. CACM, 18: 613--620. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Samurcay, R. 1988.The concept of variable in programming: Its meaning and use in problem-solving by novice programmers. In {26}, 161--178.Google ScholarGoogle Scholar
  24. Smyth, P. 1997. Clustering sequences with hidden markov models. Advances in Neural Information Processing Systems, volume 9, 648--654. The MIT Press.Google ScholarGoogle Scholar
  25. Soloway,E., Bonar,J., Ehrlich,K. 1983. Cognitive strategies and looping constructs: an empirical study. CACM, 26, 11, 853--860. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Soloway E. & Spohrer, J. 1988. Studying the novice programmer. L. Erlbaum Assoc. Inc., Hillsdale, NJ, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Spohrer, J. & Soloway, E. 1986. Analyzing the high frequency bugs in novice programs. Papers presented at the first workshop on empirical studies of programmers, E. Soloway and S. Iyengar (Eds.). Ablex Publishing, Norwood, NJ, USA, 230--251. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. ACM Graphics library. Available from: http://www-cs-faculty.stanford.edu/~eroberts/jtf/ Accessed 9/1/2011.Google ScholarGoogle Scholar
  29. Berland, M. & Martin, T. 2011. Clusters and patterns of novice programmers. AERA, New Orleans, LA.Google ScholarGoogle Scholar
  30. Blikstein, P. & Worsley, M. (2011). Learning analytics: Assessing constructionist learning using machine learning. AERA, New Orleans, LA.Google ScholarGoogle Scholar
  31. Blikstein, P. (2011). Using learning analytics to assess students' behavior in open-ended programming tasks. Proc. of the Learning Analytics Knowledge Conference, Banff. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Blikstein, P. 2008. An Atom is known by the company it keeps. Unpublished PhD. dissertation, Northwestern University, Evanston, IL. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Modeling how students learn to program

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCSE '12: Proceedings of the 43rd ACM technical symposium on Computer Science Education
      February 2012
      734 pages
      ISBN:9781450310987
      DOI:10.1145/2157136

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 February 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGCSE '12 Paper Acceptance Rate100of289submissions,35%Overall Acceptance Rate1,595of4,542submissions,35%

      Upcoming Conference

      SIGCSE Virtual 2024

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader