Graduate Consortium
Recent advances in computing have led to continually deeper integration between computers and human society. People now swim in a "sea" of socio-technical systems that synthesize large numbers of contributing users with vast amounts of source code. Examples include social media systems, open source repositories, online marketplaces and massively multiplayer online games.
Yet as the socio-technical systems in this sea have grown in complexity, their underlying computation has become increasingly difficult for people to express, manipulate, and understand. For example, when users put data into a system, they may be unable to anticipate and control how their data will be used by other people or by software in the system. As another example, when software developers create a new system that is designed to be secure, it is difficult for them to foresee all the ways that attackers will try to compromise that system. These problems are complicated by the fact that a system's software often contains defects and that different users or agents simultaneously might take actions toward differing goals. With this support, the research community has provided numerous methods, models and tools to help end users express, manipulate, and understand socio-technical systems. At an even deeper level, other research aims to develop new theories sufficient for understanding the complicated, unstable, sometimes-emergent behavior that results when large numbers of diverse, unpredictable humans are coupled to unreliable software.
The goal of the 2012 VL/HCC graduate consortium is to advance knowledge and understanding of solutions to these problems. This year, we sought a broad variety of submissions within the scope of the VL/HCC conference, and the following submissions were selected for presentation at the consortium within the stated areas.
30 September 2012, Hall Maximillian
Agenda |
|
9:00–9:40 | Welcome and Introductions |
9:40-10:30 | Session 1: Security and Ideas (2 talks) |
Elizabeth Stobert: Visual End-User Security. | |
Jill Cao: The Idea Garden: from a Qualitative Evaluation toward a Quantitative Evaluation and Generalization | |
10:30-11:00 |
Break |
11:30-12:00 | Session 2: Models and Drawings (3 talks) |
Iman Avazpour: Towards User-Centric Concrete Model Transformation. | |
Jorge Mendes: Model-Driven Spreadsheets in a Multi-User Environment. | |
Mattia De Rosa: On the Auto-Completion of Hand Drawn Symbols. | |
Short Panel discussion |
|
12:30-14:00 |
Lunch |
14:00-15:30 | Session 3: Programming (3 talks) |
Tom Lieber: Really Programming in Public. | |
Edgar Cambranes-Martínez: Using Natural Language Descriptions of Algorithms in the Early Stage of Programming. | |
Jennifer L. Davidson: Involving Older Adults in the Design and Development of Free/Open Source Software. | |
Short Panel discussion |
|
15:30-16:00 |
Break |
16:00-17:30 | Session 4: Software Engineering (2 talks) |
Dustin Heaton: What Software Engineering Can Do for Computational Science and Engineering. | |
Michael J. Lee: Social Debugging Game for Learning & Engagement. | |
Panel discussion and Round-up. |
|
17:30 |
Close |
Panel Members and Organizers
- Margaret M. Burnett · Oregon State University, USA
- Stéphane Conversy · Université de Toulouse, France
- Andrew Fish · University of Brighton, UK
- Emerson Murphy-Hill · North Carolina State University, USA