Search For:

Displaying 1-38 out of 38 total
MOOCs: So Many Learners, So Much Potential .
Found in: IEEE Intelligent Systems
By Judy Kay,Peter Reimann,Elliot Diebold,Bob Kummerfeld
Issue Date:May 2013
pp. 70-77
Massive open online courses (MOOCs) have exploded onto the scene, promising to satisfy a worldwide thirst for a high-quality, personalized, and free education. This article explores where MOOCs fit within the e-learning and Artificial Intelligence in Educa...
 
Introduction to the Special Issue on Personalization
Found in: IEEE Transactions on Learning Technologies
By Paul De Bra, Judy Kay, Stephan Weibelzahl
Issue Date:January 2009
pp. 1-2
No summary available.
 
Visualisation of Ontological Inferences for User Control of Personal Web Agents
Found in: Information Visualisation, International Conference on
By Trent Apted, Judy Kay, Andrew Lum, James Uther
Issue Date:July 2003
pp. 306
This paper describes a visualisation tool, VlUM, designed to support users in scrutinising models of their interests, preferences and knowledge. We also describe MECUREO, a tool for building lightweight ontologies from online dictionaries. It enables a use...
 
Verified Concept Mapping for Eliciting Conceptual Understanding
Found in: Computers in Education, International Conference on
By Laurent Cimolino, Judy Kay
Issue Date:December 2002
pp. 1561
Concept mapping is a valuable technique for education evaluation. This paper describes a system which supports teachers in creating concept mapping tasks which are intended to capture the student?s understanding of the ontology of a small domain. A novel f...
   
AI and Education: Grand Challenges
Found in: IEEE Intelligent Systems
By Judy Kay
Issue Date:September 2012
pp. 66-69
The educational applications of AI are a combination of what Pasteur's Quadrant describes as use-inspired basic and pure applied research. This article gives an overview of the classical and emerging architectures for AI in education. Early researchers foc...
 
Helping Everyone Create with Computing
Found in: Tenth International Conference on Creating, Connecting and Collaborating through Computing (C5 2012)
By Mark Guzdial,Judy Kay
Issue Date:January 2012
pp. x-xi
These keynotes discuss the following: help everyone create with computing and creating and controlling personalization and privacy in pervasive digital ecosystem.
   
Lifelong Learner Modeling for Lifelong Personalized Pervasive Learning
Found in: IEEE Transactions on Learning Technologies
By Judy Kay
Issue Date:October 2008
pp. 215-228
Pervasive and ubiquitous computing have the potential to make huge changes in the ways that we will learn, throughout our lives. This paper presents a vision for the lifelong user model as a first class citizen, existing independently of any single applica...
 
Clustering and Sequential Pattern Mining of Online Collaborative Learning Data
Found in: IEEE Transactions on Knowledge and Data Engineering
By Dilhan Perera, Judy Kay, Irena Koprinska, Kalina Yacef, Osmar R. Zaïane
Issue Date:June 2009
pp. 759-772
Group work is widespread in education. The growing use of online tools supporting group work generates huge amounts of data. We aim to exploit this data to support mirroring: presenting useful high-level views of information about the group, together with ...
 
Tabletop File System Access: Associative and Hierarchical Approaches
Found in: Horizontal Interactive Human-Computer Systems, International Workshop on
By Anthony Collins, Trent Apted, Judy Kay
Issue Date:October 2007
pp. 113-120
This paper presents the design of two tabletop file system interfaces: OnTop, a novel associative access approach to file system interaction, where users navigate multiple file systems by selecting focus files; and the Browser, a hierarchical interface tha...
 
Successful Aging
Found in: IEEE Pervasive Computing
By Paul Cuddihy, Roderick T. Hinman, Al-Thaddeus Avestruz, Elmer C. Lupton, Gary Livshin, John I. Rodriguez, Steven B. Leeb, Corinne M. Clark, Kathy J. Horvath, Ladislav Volicer, Bjorn Landfeldt, Judy Kay, Robert Kummerfeld, Aaron Quigley, David West, Trent A
Issue Date:April 2004
pp. 48-50
This issue's Works in Progress department presents six abstracts for projects that are developing interesting solutions to the elderly's quality of life challenges. The first two abstracts discuss projects that will help provide the elderly with freedom an...
 
Automatic Extraction of Ontologies from Teaching Document Metadata
Found in: Computers in Education, International Conference on
By Judy Kay, Sam Holden
Issue Date:December 2002
pp. 1555
SITS (Scrutable Intelligent Teaching System) is designed to make use of existing learning items in flexible and effective learning interactions. The reuse of pre-existing resources is important since creating new learning resources is a time consuming task...
   
Automatic Construction of Learning Ontologies
Found in: Computers in Education, International Conference on
By Trent Apted, Judy Kay
Issue Date:December 2002
pp. 1563
This paper describes a system which automatically constructs an extensive ontology of computer science. This can serve as a basis for making inferences about student models and other reasoning within a teaching system. The system enables a user to select a...
   
An Intelligent Tutoring System for the Dijkstra-Gries Methodology
Found in: IEEE Transactions on Software Engineering
By Frank Ng, Gregory Butler, Judy Kay
Issue Date:May 1995
pp. 415-428
This paper describes the design and implementation of an intelligent tutoring system for the Dijkstra-Gries programming methodology as defined by Gries in “The Science of Programming” . The first part of the paper identifies the requirements of intelligent...
 
Creating personalized systems that people can scrutinize and control: Drivers, principles and experience
Found in: ACM Transactions on Interactive Intelligent Systems (TiiS)
By Bob Kummerfeld, Judy Kay
Issue Date:December 2012
pp. 1-42
Widespread personalized computing systems play an already important and fast-growing role in diverse contexts, such as location-based services, recommenders, commercial Web-based services, and teaching systems. The personalization in these systems is drive...
     
Orchestrating a multi-tabletop classroom: from activity design to enactment and reflection
Found in: Proceedings of the 2012 ACM international conference on Interactive tabletops and surfaces (ITS '12)
By Judy Kay, Kalina Yacef, Marie-Theresa Edbauer, Roberto Martinez Maldonado, Yannis Dimitriadis
Issue Date:November 2012
pp. 119-128
If multi-tabletop classrooms were available in each school, how would teachers plan and enact their activities to enhance learning and collaboration? How can they evaluate how the activities actually went compared with the plan? Teachers' effectiveness in ...
     
On the reliability of classifying programming tasks using a neo-piagetian theory of cognitive development
Found in: Proceedings of the ninth annual international conference on International computing education research (ICER '12)
By Donna Teague, Judy Kay, Raymond Lister, Richard Gluga
Issue Date:September 2012
pp. 31-38
Recent research has proposed Neo-Piagetian theory as a useful way of describing the cognitive development of novice programmers. Neo-Piagetian theory may also be a useful way to classify materials used in learning and assessment. If Neo-Piagetian coding of...
     
Investigating intuitiveness and effectiveness of gestures for free spatial interaction with large displays
Found in: Proceedings of the 2012 International Symposium on Pervasive Displays (PerDis '12)
By Anthony Collins, Judy Kay, Kazjon Grace, Luke Hespanhol, Martin Tomitsch
Issue Date:June 2012
pp. 1-6
A key challenge for creating large interactive displays in public spaces is in the definition of ways for the user to interact that are effective and easy to learn. This paper presents the outcomes of user evaluation sessions designed to test a series of d...
     
Over-confidence and confusion in using bloom for programming fundamentals assessment
Found in: Proceedings of the 43rd ACM technical symposium on Computer Science Education (SIGCSE '12)
By Raymond Lister, Richard Gluga, Judy Kay, Sabina Kleitman, Tim Lever
Issue Date:February 2012
pp. 147-152
A computer science student is required to progress from a novice programmer to a proficient developer through the programming fundamentals sequence of subjects. This paper deals with the capturing and representation of learning progression. The key contrib...
     
Who did what? Who said that?: Collaid: an environment for capturing traces of collaborative learning at the tabletop
Found in: Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces (ITS '11)
By Anthony Collins, Judy Kay, Kalina Yacef, Roberto Martinez
Issue Date:November 2011
pp. 172-181
Tabletops have the potential to provide new ways to support collaborative learning generally and, more specifically, to aid people in learning to collaborate more effectively. To achieve this potential, we need to gain understanding of how to design tablet...
     
Firestorm: a brainstorming application for collaborative group work at tabletops
Found in: Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces (ITS '11)
By Andrew Clayphan, Anthony Collins, Bob Kummerfeld, Christopher Ackad, Judy Kay
Issue Date:November 2011
pp. 162-171
The tabletop computer interface has the potential to support idea generation by a group using the brainstorming technique. This paper describes the design and implementation of a table-top brainstorming system. To gain insights into its effectiveness, we c...
     
Core functionality and new applications for tabletops and interactive surfaces
Found in: Proceedings of the 13th international conference on Ubiquitous computing (UbiComp '11)
By Anthony Collins, Christopher James Ackad, Hanley Weng, Judy Kay, Paul Sztajer, Peter Ward, Trent Apted
Issue Date:September 2011
pp. 607-608
New forms of natural user interfaces, particularly tabletops, are now a possibility due to the staggering advances in sensing and display technology. There is an immediate need for corresponding progress on the foundational software for exploiting the pote...
     
Reciprocal recommender system for online dating
Found in: Proceedings of the fourth ACM conference on Recommender systems (RecSys '10)
By Irena Koprinska, Judy Kay, Kalina Yacef, Luiz Pizzato, Thomas Chung, Tomek Rej
Issue Date:September 2010
pp. 353-354
Reciprocal recommender is a class of recommender systems that is important for tasks where people are both the subject and the object of the recommendation; one such task is online dating. We have implemented RECON, a reciprocal recommender for online dati...
     
RECON: a reciprocal recommender for online dating
Found in: Proceedings of the fourth ACM conference on Recommender systems (RecSys '10)
By Irena Koprinska, Judy Kay, Luiz Pizzato, Thomas Chung, Tomek Rej
Issue Date:September 2010
pp. 207-214
The reciprocal recommender is a class of recommender system that is important for several tasks where people are both the subjects and objects of the recommendation. Some examples are: job recommendation, mentor-mentee matching, and online dating. Despite ...
     
Curator: a design environment for curating tabletop museum experiences
Found in: Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces (ITS '09)
By Anthony Collins, Benjamin Sprengart, Judy Kay
Issue Date:November 2009
pp. 1-1
Interactive tabletops show great potential to be used in learning contexts, particularly in museums, as a way for people to collaboratively learn and explore rich sets of digital information. However, it is a real challenge for exhibition designers, or Cur...
     
Understanding file access mechanisms for embedded Ubicomp collaboration interfaces
Found in: Proceedings of the 11th international conference on Ubiquitous computing (Ubicomp '09)
By Anastasia Bezerianos, Anthony Collins, Gregor McEwan, Judy Kay, Markus Rittenbruch, Rainer Wasinger
Issue Date:September 2009
pp. 135-144
This paper explores the nature of interfaces to support people in accessing their files at tabletop displays embedded in the environment. To do this, we designed a study comparing people's interaction with two very different classes of file system access i...
     
WikiNavMap: a visualisation to supplement team-based wikis
Found in: CHI '07 extended abstracts on Human factors in computing systems (CHI '07)
By Adam John Ullman, Judy Kay
Issue Date:April 2007
pp. 2711-2716
Wikis are an invaluable tool for quickly and easily creating and editing a collection of web pages. Their use is particularly interesting in small teams to serve as a support for group communication, for co-ordination, as well as for creating collaborative...
     
ONCOR: ontology- and evidence-based context reasoner
Found in: Proceedings of the 12th international conference on Intelligent user interfaces (IUI '07)
By David J. Carmichael, Judy Kay, William T. Niu
Issue Date:January 2007
pp. 290-293
In this paper, we describe ONCOR, our ontology- and evidence-based approach to reason about context. ONCOR tackles the critical problem of providing a flexible and pragmatic approach to building light-weight ontologies of places, devices and sensors in MyP...
     
Using an intergenerational communications system as a 'light-weight' technology probe
Found in: CHI '06 extended abstracts on Human factors in computing systems (CHI '06)
By Bob Kummerfeld, Geoff Langdale, Judy Kay
Issue Date:April 2006
pp. 1001-1006
A problem with the technology probe [1] approach is the substantial time required to gain results. For prototype technological systems, a further problem is the requirement that systems are deployed into non- technical end-user's homes, where they are comp...
     
Undergraduate research experience in computer science education
Found in: Proceedings of the 7th annual conference on Innovation and technology in computer science education (ITiCSE'02)
By Judy Kay, Tony Greening
Issue Date:June 2002
pp. 125-180
Computer Science Education is gradually emerging as a valid research focus within the wider computer science community. This paper presents an account of a successful subject that offers senior undergraduates experience of research using Computer Science E...
     
A mentor program in CS1
Found in: Proceedings of the 7th annual conference on Innovation and technology in computer science education (ITiCSE'02)
By Amanda Miller, Judy Kay
Issue Date:June 2002
pp. 125-180
Mentor programs are a highly effective way of assisting students with the transition from high school to university. This paper documents the introduction of the mentor program in our department. In this program, higher year students volunteered to act as ...
     
An intelligent interface for sorting electronic mail
Found in: Proceedings of the 7th international conference on Intelligent user interfaces (IUI '02)
By Elisabeth Crawford, Eric McCreath, Judy Kay
Issue Date:January 2002
pp. 182-183
Classification of email is an important everyday task for a large and growing number of users. This paper describes the i-ems (Intelligent-Electronic Mail Sorter) mail interface, which offers a view of the inbox based on predicted classifications of messag...
     
Supporting reflection in introductory computer science
Found in: Proceedings of the thirty-first SIGCSE technical symposium on Computer science education (SIGCSE '00)
By Alan Fekete, Jeff Kingston, Judy Kay, Kapila Wimalaratne
Issue Date:March 2000
pp. 313-317
Educational theory suggests that student learning is enhanced when students pay attention to their own learning. In this paper, we describe a range of innovative techniques that we use to encourage students to reflect on the state of their knowledge, and o...
     
User interface design and programming for computer science majors
Found in: Proceedings of the third Australasian conference on Computer science education (ACSE '98)
By Bob Kummerfeld, Judy Kay
Issue Date:July 1998
pp. 121-126
In very many situations the collection of data from distributed hosts for its subsequent use to generate an intrusion detection profile may not be technically feasible (e.g., due to data size or network security transfer protocols). This situation is espec...
     
A problem-based interface design and programming course
Found in: Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education (SIGCSE '98)
By Bob Kummerfeld, Judy Kay
Issue Date:February 1998
pp. 313-317
This paper describes a course that addresses two important issues: introducing interface design and programming at the same time as helping students develop life-long learning skills. Many computer science programmes could well be based on the assumption t...
     
Results of a PBL trial in first-year computer science
Found in: Proceedings of the second Australasian conference on Computer science education (ACSE '97)
By Jeffrey H. Kingston, Judy Kay, Kathryn Crawford, Tony Greening
Issue Date:July 1997
pp. 201-206
In very many situations the collection of data from distributed hosts for its subsequent use to generate an intrusion detection profile may not be technically feasible (e.g., due to data size or network security transfer protocols). This situation is espec...
     
Problem-based learning of first year computer science
Found in: Proceedings of the first Australasian conference on Computer science education (ACSE '96)
By Jeffrey H. Kingston, Judy Kay, Kathryn Crawford, Tony Greening
Issue Date:July 1996
pp. 13-18
In very many situations the collection of data from distributed hosts for its subsequent use to generate an intrusion detection profile may not be technically feasible (e.g., due to data size or network security transfer protocols). This situation is espec...
     
Visualisation of entrenched user preferences
Found in: Conference companion on Human factors in computing systems: common ground (CHI '96)
By Judy Kay, Richard C. Thomas
Issue Date:April 1996
pp. 285-286
We present an approach to control information flow in object-oriented systems. The decision of whether an informatin flow is permitted or denied depends on both the authorizations specified on the objects and the process by which information is obtained an...
     
Studying long-term system use
Found in: Communications of the ACM
By Judy Kay, Richard C. Thomas
Issue Date:January 1988
pp. 61-69
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.
     
 1