181 research outputs found

    Semi-automatic assessment of unrestrained Java code: a Library, a DSL, and a workbench to assess exams and exercises

    Full text link
    © ACM 2015. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in http://dx.doi.org/10.1145/2729094.2742615Automated marking of multiple-choice exams is of great interest in university courses with a large number of students. For this reason, it has been systematically implanted in almost all universities. Automatic assessment of source code is however less extended. There are several reasons for that. One reason is that almost all existing systems are based on output comparison with a gold standard. If the output is the expected, the code is correct. Otherwise, it is reported as wrong, even if there is only one typo in the code. Moreover, why it is wrong remains a mystery. In general, assessment tools treat the code as a black box, and they only assess the externally observable behavior. In this work we introduce a new code assessment method that also verifies properties of the code, thus allowing to mark the code even if it is only partially correct. We also report about the use of this system in a real university context, showing that the system automatically assesses around 50% of the work.This work has been partially supported by the EU (FEDER) and the Spanish Ministerio de Economíay Competitividad (Secretaría de Estado de Investigación, Desarrollo e Innovación) under grant TIN2013-44742-C4-1-R and by the Generalitat Valenciana under grant PROMETEOII2015/013. David Insa was partially supported by the Spanish Ministerio de Educación under FPU grant AP2010-4415.Insa Cabrera, D.; Silva, J. (2015). Semi-automatic assessment of unrestrained Java code: a Library, a DSL, and a workbench to assess exams and exercises. ACM. https://doi.org/10.1145/2729094.2742615SK. A Rahman and M. Jan Nordin. A review on the static analysis approach in the automated programming assessment systems. In National Conference on Programming 07, 2007.K. Ala-Mutka. A survey of automated assessment approaches for programming assignments. In Computer Science Education, volume 15, pages 83--102, 2005.C. Beierle, M. Kula, and M. Widera. Automatic analysis of programming assignments. In Proc. der 1. E-Learning Fachtagung Informatik (DeLFI '03), volume P-37, pages 144--153, 2003.J. Biggs and C. Tang. Teaching for Quality Learning at University : What the Student Does (3rd Edition). In Open University Press, 2007.P. Denny, A. Luxton-Reilly, E. Tempero, and J. Hendrickx. CodeWrite: Supporting student-driven practice of java. In Proceedings of the 42nd ACM technical symposium on Computer science education, pages 09--12, 2011.R. Hendriks. Automatic exam correction. 2012.P. Ihantola, T. Ahoniemi, V. Karavirta, and O. Seppala. Review of recent systems for automatic assessment of programming assignments. In Proceedings of the 10th Koli Calling International Conference on Computing Education Research, pages 86--93, 2010.H. Kitaya and U. Inoue. An online automated scoring system for Java programming assignments. In International Journal of Information and Education Technology, volume 6, pages 275--279, 2014.M.-J. Laakso, T. Salakoski, A. Korhonen, and L. Malmi. Automatic assessment of exercises for algorithms and data structures - a case study with TRAKLA2. In Proceedings of Kolin Kolistelut/Koli Calling - Fourth Finnish/Baltic Sea Conference on Computer Science Education, pages 28--36, 2004.Y. Liang, Q. Liu, J. Xu, and D. Wang. The recent development of automated programming assessment. In Computational Intelligence and Software Engineering, pages 1--5, 2009.K. A. Naudé, J. H. Greyling, and D. Vogts. Marking student programs using graph similarity. In Computers & Education, volume 54, pages 545--561, 2010.A. Pears, S. Seidman, C. Eney, P. Kinnunen, and L. Malmi. Constructing a core literature for computing education research. In SIGCSE Bulletin, volume 37, pages 152--161, 2005.F. Prados, I. Boada, J. Soler, and J. Poch. Automatic generation and correction of technical exercices. In International Conference on Engineering and Computer Education (ICECE 2005), 2005.M. Supic, K. Brkic, T. Hrkac, Z. Mihajlovic, and Z. Kalafatic. Automatic recognition of handwritten corrections for multiple-choice exam answer sheets. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1136--1141, 2014.S. Tung, T. Lin, and Y. Lin. An exercise management system for teaching programming. In Journal of Software, 2013.T. Wang, X. Su, Y. Wang, and P. Ma. Semantic similarity-based grading of student programs. In Information and Software Technology, volume 49, pages 99--107, 2007

    Performance of plastic electron optics components fabricated using a 3D printer

    Get PDF
    We show images produced by an electron beam deflector, a quadrupole lens and a einzel lens fabricated from conducting and non-conducting plastic using a 3D printer. Despite the difficulties associated with the use of plastics in vacuum, such as outgassing, poor conductivity, and print defects, the devices were used successfully in vacuum to steer, stretch and focus electron beams to millimeter diameters. Simulations indicate that much smaller focus spot sizes might be possible for such 3D-printed plastic electron lenses taking into account some possible surface defects. This work was motivated by our need to place electron optical components in difficult-to-access geometries. Our proof-of-principle demonstration opens the door to consider 3D-printed electron microscopes, whose reduced cost would make such microscopes more widely available. Potentially, this may have a significant impact on electron beam science and technology in general and electron microscopy in particular

    TWAM: A Certifying Abstract Machine for Logic Programs

    Full text link
    Type-preserving (or typed) compilation uses typing derivations to certify correctness properties of compilation. We have designed and implemented a type-preserving compiler for a simply-typed dialect of Prolog we call T-Prolog. The crux of our approach is a new certifying abstract machine which we call the Typed Warren Abstract Machine (TWAM). The TWAM has a dependent type system strong enough to specify the semantics of a logic program in the logical framework LF. We present a soundness metatheorem which constitutes a partial correctness guarantee: well-typed programs implement the logic program specified by their type. This metatheorem justifies our design and implementation of a certifying compiler from T-Prolog to TWAM.Comment: 41 pages, under submission to ACM Transactions on Computational Logi

    Performance of plastic electron optics components fabricated using a 3D printer

    Get PDF
    We show images produced by an electron beam deflector, a quadrupole lens and a einzel lens fabricated from conducting and non-conducting plastic using a 3D printer. Despite the difficulties associated with the use of plastics in vacuum, such as outgassing, poor conductivity, and print defects, the devices were used successfully in vacuum to steer, stretch and focus electron beams to millimeter diameters. Simulations indicate that much smaller focus spot sizes might be possible for such 3D-printed plastic electron lenses taking into account some possible surface defects. This work was motivated by our need to place electron optical components in difficult-to-access geometries. Our proof-of-principle demonstration opens the door to consider 3D-printed electron microscopes, whose reduced cost would make such microscopes more widely available. Potentially, this may have a significant impact on electron beam science and technology in general and electron microscopy in particular

    Transcriptome Analysis in Peripheral Blood of Humans Exposed to Environmental Carcinogens: A Promising New Biomarker in Environmental Health Studies

    Get PDF
    BACKGROUND: Human carcinogenesis is known to be initiated and/or promoted by exposure to chemicals that occur in the environment. Molecular cancer epidemiology is used to identify human environmental cancer risks by applying a range of effect biomarkers, which tend to be nonspecific and do not generate insights into underlying modes of action. Toxicogenomic technologies may improve on this by providing the opportunity to identify, molecular biomarkers consisting of altered gene expression profiles. OBJECTIVES: The aim of the present study, was to monitor the expression of selected genes in a random sample of adults in Flanders selected from specific regions with (presumably,) different environmental burdens. Furthermore, associations of gene expression with blood and urinary, measures of biomarkers of exposure, early, phenotypic effects, and tumor markers were investigated. RESULTS: Individual gene expression of cytochrome p450 1B1, activating transcription factor 4, mitogen-activated protein kinase K superoxide dismutase 2 (Mn), chemokine (C-X-C motif) ligand 1 (melanoma growth stimulating activity, alpha), diacylglycerol 0 acyltransferase homolog 2 (mouse), tigger transposable element derived 3, and PTEN-induced putative kinasel were measured by means of quantitative polymerase chain reaction in peripheral blood cells of 398 individuals. After correction for the confounding effect of tobacco smoking, inhabitants of the Olen region showed the highest differences in gene expression levels compared with inhabitants from the Gent and fruit cultivation regions. Importantly, we observed multiple significant correlations of particular gene expressions with blood and urinary, measures of various environmental carcinogens. CONCLUSIONS: Considering the observed significant differences between gene expression levels in inhabitants of various regions in Flanders and the associations of gene expression with blood or urinary measures of environmental carcinogens, we conclude that gene expression profiling appears promising as a tool for biological monitoring in relation to environmental exposures in humans

    Co-Localization of the Oncogenic Transcription Factor MYCN and the DNA Methyl Binding Protein MeCP2 at Genomic Sites in Neuroblastoma

    Get PDF
    MYCN is a transcription factor that is expressed during the development of the neural crest and its dysregulation plays a major role in the pathogenesis of pediatric cancers such as neuroblastoma, medulloblastoma and rhabdomyosarcoma. MeCP2 is a CpG methyl binding protein which has been associated with a number of cancers and developmental disorders, particularly Rett syndrome.Using an integrative global genomics approach involving chromatin immunoprecipitation applied to microarrays, we have determined that MYCN and MeCP2 co-localize to gene promoter regions, as well as inter/intragenic sites, within the neuroblastoma genome (MYCN amplified Kelly cells) at high frequency (70.2% of MYCN sites were also positive for MeCP2). Intriguingly, the frequency of co-localization was significantly less at promoter regions exhibiting substantial hypermethylation (8.7%), as determined by methylated DNA immunoprecipitation (MeDIP) applied to the same microarrays. Co-immunoprecipitation of MYCN using an anti-MeCP2 antibody indicated that a MYCN/MeCP2 interaction occurs at protein level. mRNA expression profiling revealed that the median expression of genes with promoters bound by MYCN was significantly higher than for genes bound by MeCP2, and that genes bound by both proteins had intermediate expression. Pathway analysis was carried out for genes bound by MYCN, MeCP2 or MYCN/MeCP2, revealing higher order functions.Our results indicate that MYCN and MeCP2 protein interact and co-localize to similar genomic sites at very high frequency, and that the patterns of binding of these proteins can be associated with significant differences in transcriptional activity. Although it is not yet known if this interaction contributes to neuroblastoma disease pathogenesis, it is intriguing that the interaction occurs at the promoter regions of several genes important for the development of neuroblastoma, including ALK, AURKA and BDNF

    abstractXOR: A global constraint dedicated to differential cryptanalysis

    Get PDF
    International audienceConstraint Programming models have been recently proposed to solve cryptanalysis problems for symmetric block ciphers such as AES. These models are more efficient than dedicated approaches but their design is difficult: straightforward models do not scale well and it is necessary to add advanced constraints derived from cryptographic properties. We introduce a global constraint which simplifies the modelling step and improves efficiency. We study its complexity, introduce propagators and experimentally evaluate them on two cryptanalysis problems (single-key and related-key) for two block ciphers (AES and Midori)

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Get PDF
    Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al. comprehended that differential cryptanalysis rather uses differentials instead of single characteristics. In this paper, we consider exactly the gap between these two approaches and investigate this gap in the context of recent lightweight cryptographic primitives. This shows that for many recent designs like Midori, Skinny or Sparx one has to be careful as bounds from counting the number of active S-boxes only give an inaccurate evaluation of the best differential distinguishers. For several designs we found new differential distinguishers and show how this gap evolves. We found an 8-round differential distinguisher for Skinny-64 with a probability of 2−56.932−56.93, while the best single characteristic only suggests a probability of 2−722−72. Our approach is integrated into publicly available tools and can easily be used when developing new cryptographic primitives. Moreover, as differential cryptanalysis is critically dependent on the distribution over the keys for the probability of differentials, we provide experiments for some of these new differentials found, in order to confirm that our estimates for the probability are correct. While for Skinny-64 the distribution over the keys follows a Poisson distribution, as one would expect, we noticed that Speck-64 follows a bimodal distribution, and the distribution of Midori-64 suggests a large class of weak keys

    Implementation and effects of user participation in playground management: a comparative study of two Swedish municipalities

    Get PDF
    This paper describes and analyses how customer orientation strategies, with the focus on user participation, are implemented in playground management and their effects on managers’ attitudes and work with physical playgrounds. A comparative case study was conducted in two Swedish municipalities that involve users in different ways: through a manager-driven participation process and through informal user-initiated dialogue. The empirical material consisted of qualitative interviews with professionals in the management organisations and studies of local playgrounds. Implementation of strategies for user participation and tactical management activities appeared to be of importance. The manager-driven participation strategy was associated with a particularly positive attitude among managers, but also difficulties such as maintaining continuous dialogue with users. The small differences found in playground provision between the two municipalities give reason to question the physical effects of participation processes, and show the need for further research
    corecore