<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>INSIGHT: a Semantic Visual Analytics for Programming Discussion Forums</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Piyush Awasthi</string-name>
          <email>Piyush.Awasthi@asu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>I-Han Hsaio</string-name>
          <email>Sharon.Hsiao@asu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Computing, Informatics &amp; Decision, Systems Engineering, Arizona State University</institution>
          ,
          <addr-line>699 S. Mill Ave., Tempe AZ</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <abstract>
        <p>This paper presents INSIGHT, a visual analytics web application, designed to induce &amp; inspire programming language learning from discussion forums. The visual analytics, extracts and displays semantic content from 'Stack Exchange' in a form of bubble chart. The bubbles represent summarized semantic concepts from the forum posts and outlines the concept specificity of each individual post. The discussion forum content are modeled as concepts based on an innovative Topic Facet Modeling algorithm (a probabilistic topic model that assumes all words in single sentence are generated from one topic facet), and aimed to provide better understanding and solicitation of the increasing large volume of discussion content. We hypothesize that by navigating and interacting (browsing, sorting, searching etc.) with the Facets, will enhance learning. A comprehensive system design rationales and preliminary qualitative study are reported in this paper.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Learning Analytics</kwd>
        <kwd>discourse analysis</kwd>
        <kwd>visual analytics</kwd>
        <kwd>programming</kwd>
        <kwd>discussion forums</kwd>
        <kwd>computer-supported collaborative learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        tree, &amp; Rountree, 2003). There have been major
educational technology advances over the last two decades,
centered on understanding the nature of programming skills
explicitly using declarative aspects of programmer’s knowledge
(i.e. program comprehension and generation, required
concepts &amp; skills to program). For example: intelligent tutors,
auto program feedback generation, collaborative
programming support, personalized learning resources, etc.
        <xref ref-type="bibr" rid="ref1 ref19 ref2 ref24 ref27 ref36 ref4 ref6 ref8">( Aleven,
McLaren, Roll, &amp; Koedinger, 2006; Anderson &amp; Skwarecki,
1986; Atkinson &amp; Renkl, 2007; Barnes &amp; Stamper, 2008;
Boyer et al., 2011; Hsiao, Sosnovsky, &amp; Brusilovsky, 2010;
Lye &amp; Koh, 2014; Piech, Sahami, Koller, Cooper, &amp;
Blikstein, 2012; VanDeGrift, 2004)</xref>
        The technology support has
evolved from classrooms to online, declarative to exploratory,
and individual to social. In teaching and learning
programming, students are typically asked to refer to API
(Application Programming Interface) or programming textbooks
for relevant information (i.e. code examples). The
internalization process from forming a question to reaching out to
APIs or textbooks is usually not captured in learning
programming. From a constructivism point of view, the action
of articulating a problem and initiating search or
referencing can be a valuable learning activity. There are numerous
tools that have been built to make completing programming
tasks easier, such as Mica
        <xref ref-type="bibr" rid="ref32">(Stylos &amp; Myers, 2006)</xref>
        (there are
more cases reviewed in the literature review section), but
less is focused on amplifying learning opportunities.
In the easily accessible Internet era, search engines, index
and make the excessive amount of programming problems
and solutions available. Because programming problems are
usually more complex than a simple sequence of query
keywords, dedicated communities such as discussion forums and
Q&amp;A sites are the most popular alternatives for problems &amp;
solutions. The drastic shift in momentum of learning
opportunities from APIs and textbooks to community help is
not yet fully comprehended though. Besides, forums or
discussion boards usually lack dynamic and extensive content
analysis due to large and increasing content volume and high
computational cost in discourse analyses. In this work, we
aim to research a new technology to facilitate online
learning from programming discussion forum. We apply Learning
Analytics approach, which has demonstrated promising
results in online learning
        <xref ref-type="bibr" rid="ref30">(Siemens &amp; Baker, 2012)</xref>
        . However,
the majority of learning analytics focuses on visual
representations or the system’s usefulness, the core should be focused
on the visualization impact to improve learning or teaching
        <xref ref-type="bibr" rid="ref39">(Verbert, Duval, Klerkx, Govaerts, &amp; Santos, 2013)</xref>
        . In this
work, we present a new visual analytics system that targets
at providing better understanding and solicitation of the
increasing large volume of discussion content.
      </p>
      <p>In the rest of the paper, we summarize the related work in
learning analytics and other intelligent visual support for
programming language learning. We then describe briefly
the methodology to extract forum content semantics. In
section 4, we present the system design and rationales. A
user study and preliminary results are presented in section
5 &amp; 6. Finally, we summarize the work and discuss future
work and limitation.</p>
    </sec>
    <sec id="sec-2">
      <title>2. LITERATURE REVIEW</title>
    </sec>
    <sec id="sec-3">
      <title>2.1 Learning Analytics</title>
      <p>
        Signals project at Purdue University is one of the pioneering
examples of the successful application of academic analytics
that integrate predictive modeling and report significantly
higher grades and retention rates than were observed in
control groups
        <xref ref-type="bibr" rid="ref3">(Arnold, 2010)</xref>
        . Septris and SICKO project at
Stanford School of Medicine utilizes educational simulation
games to o↵er deeper insight into learner’s competency and
decision making to help prepare doctors well. The game
analytics not only help instructors see what choice learners
made but also what data was used to make those choices
and when they decided to make those choices.
        <xref ref-type="bibr" rid="ref34">(Jamie Tsui,
James Lau, Lisa Shieh, 2014)</xref>
        . The application has been well
received by the learners and instructors with over 32000
usage, 16000 plays and 2500 completions.
      </p>
      <p>
        Over the decades, discourse analysis on discussion forums
has been carried out through various formats, network
analyses, topical analyses, interactive explorers, knowledge
extraction, etc.
        <xref ref-type="bibr" rid="ref12 ref15 ref22 ref38 ref40">(Dave, Wattenberg, &amp; Muller, 2004;
Gretarsson et al., 2012; Indratmo, Vassileva, &amp; Gutwin, 2008; Lee,
Kim, Cho, &amp; Woo, 2013; Wei et al., 2010)</xref>
        . With the rapid
growth of free, open, and large user-based online discussion
forums, it is essential, therefore, for education researchers
to pay more attention to emerging technologies that
facilitate learning in cyberspace. For instance, (Sande, 2010)
investigated online tutoring forums for homework help by
making observations on the participation patterns and the
pedagogical quality of the content.
        <xref ref-type="bibr" rid="ref16">(Hanrahan, Convertino,
&amp; Nelson,2012; Posnett, Warburg, Devanbu, &amp; Filkov, 2012)</xref>
        studied expertise modeling in such environment. Cohere
        <xref ref-type="bibr" rid="ref29">(Shum,2008)</xref>
        investigates semantic connections by
identifying the link types to associate negative, positive,
neutral interactions among online discourses.
        <xref ref-type="bibr" rid="ref41">(Wise, Zhao, &amp;
Hausknecht,2013)</xref>
        observed the listening behavior, which
encapsulates di↵erent actions that learners take in relation to
others posts (attending, reading etc.), to further describe
the discussion engagement.
      </p>
    </sec>
    <sec id="sec-4">
      <title>2.2 Intelligent Visual Support for Programming</title>
      <p>
        In the VL/HCC (IEEE Symposium on Visual Languages
and Human-Centric Computing) community, we can see a
large amount of research addressing the issue that
developers tend to interleave between activities like searching for
relevant codes and collecting codes and other information
that they believe would be necessary for editing or
duplication
        <xref ref-type="bibr" rid="ref21">(Ko, Myers, Coblenz, &amp; Aung, 2006)</xref>
        . These tools
include navigational shortcuts to the code in IDE
        <xref ref-type="bibr" rid="ref31">(Singer,
Elves, &amp; Storey, 2005)</xref>
        , leveraging version history data to
predict code changes (Zimmermann, Zeller, Weissgerber, &amp;
Diehl, 2005), better use of API
        <xref ref-type="bibr" rid="ref32">(Stylos &amp; Myers, 2006)</xref>
        , and
integration of web search or recommending source code
examples in development environment
        <xref ref-type="bibr" rid="ref17 ref18 ref32 ref9">(Brandt, 2010; Holmes
&amp; Murphy, 2005; Hsiao, Li, &amp; Lin, 2008; Stylos &amp; Myers,
2006)</xref>
        . These systems were designed mainly to extract
relevant information from the web to aid in current coding
tasks and save time that would otherwise be spent
navigating through codes to gather information. Moreover, with
the rise of web 2.0, we also see that a variety of
technologies (blogs, tags, wikis, recommenders etc.) are emerging
to exploit social information foraging
        <xref ref-type="bibr" rid="ref10">(Chi, Pirolli, &amp; Lam,
2007)</xref>
        , such as online collaborative programming (social
coding in GitHub1), Q&amp;A websites, crowdsourcing suggestions,
etc.
        <xref ref-type="bibr" rid="ref11 ref14 ref18 ref25 ref26 ref29 ref33 ref37 ref5">(Bacchelli, Ponzanelli, &amp; Lanza, 2012; Dabbish, Stuart,
Tsay, &amp; Herbsleb, 2012; Goldman, Little, &amp; Miller, 2011;
Hsiao et al., 2008; Mujumdar et al., 2011; Nasehi, Sillito,
Maurer, &amp; Burns, 2012; Treude, Barzilay, &amp; Storey, 2011;
Vasilescu, Serebrenik, Devanbu, &amp; Filkov, 2014)</xref>
        . However,
almost all of these tools are targeted at problem-solving
augmentation, reducing coding cognitive overhead when coding,
and utility features enhancement (i.e. collaboration). Tools
to support learning activities are less evident.
      </p>
    </sec>
    <sec id="sec-5">
      <title>3. TOPIC FACET MODEL</title>
      <p>
        Latent Dirichlet Allocation (LDA)
        <xref ref-type="bibr" rid="ref7">(Blei, Ng, &amp; Jordan, 2003)</xref>
        is an unsupervised algorithm that uses bag of words
approach to perform statistical topic modeling, which is a
wellestablished method for uncovering hidden structures in large
text corpora. There are several variations of LDA-based
topic models to successfully encapsulate large text semantics
into topic words, such as online reviews, political opinions,
microblog streams, email summaries etc.
        <xref ref-type="bibr" rid="ref23">(Jo &amp; Oh, 2011;
Lan, Buntine, &amp; Huidong, 2010; Liu et al., 2012; Wang,
Agichtein, &amp; Benzi, 2012)</xref>
        . In this work, we present a novel
Topical Facets Modeling (TFM) method to capture online
forum posts semantics.
      </p>
      <p>
        The TFM algorithm automatically detect topics from
conversational and relatively short amount of texts in each
forum post. It is an extension of LDA
        <xref ref-type="bibr" rid="ref7">(Blei et al., 2003)</xref>
        and
SLDA (Lan et al., 2010). A topic is a multinomial
distribution of words that represents a concept from each forum
post. A facet is a multinomial distribution of words that
represents a more specific topic in the forum, for instance,
extends (a java keyword) is one of the main facets in
determining whether a program implemented inheritance concept
in Java programming language or not. Thus, Topic Facet
Model firstly adopts SLDA (Lan et al., 2010) in the topic
model. Essentially, SLDA takes into account the position
of each individual word of topic inference. It then forces all
words in a sentence are generated from one topic. When a
post is topic-specific, short-and-sweet, such as how to write
a for loop?, SLDA is supposed to distinctively generate the
corresponding topic word - loops. However, as we discussed
earlier, an open discussion forums often mix with various
complexities of posts. For instance, ”Can an array of
objects be iterated in enhanced for loop”. Given the sentence
1https://github.com It is an online software repository site,
which allows distributed revision control and source code
management.
combines two main concepts, arrays and loops, SLDA will
constrain only one topic word to be generated. In this case,
the key of the question is about topic arrays (whether one
can perform a function with array data structure), however,
due to that there are more topic loops related words
represented, the SLDA will misinterpret it. This is where the
facets come into play, to take into account specificity of a
topic in the model. Following the same example, we can
specify ’array iteration’ as a facet for topic loops
(Hsiao,IH, &amp; Awasthi,P. 2015, to be appeared) . To explain Topic
Facet Model algorithmically, Figure 1 shows the plate
diagram. The words generative process is explained following.
1. For every pair of topic word t and facet f, draw a word
distribution ft ⇠ Dirichlet ( f)
      </p>
      <sec id="sec-5-1">
        <title>2. For each document d,</title>
        <p>a. Draw the document’s topic word distribution ⇡ d ⇠</p>
        <p>Dirichlet ( )
b. For each topic word t, draw a facet distribution ✓ df
⇠ Dirichlet (↵ )
c. For each sentence,
• Choose a topic word j ⇠ Multinomial (⇡ d)
• Given topic word j, choose a facet k ⇠
Multinomial (✓ dj)
• Generate words w ⇠</p>
        <p>Multinomial ( jk)</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4. INSIGHT</title>
      <p>In order to provide dynamic intelligent &amp; personalized
support for large-scale of online discussion forums, we build a
web application and called it INSIGHT (since, it provides
an insight on the concepts on which the answer has been
built, to help user map his way to proper understanding of
it), by using Django, Python and Javascript. The web
application (Figure 2) re-structures a discussion forum site into
3 parts: Filters, Analytics Visualizations and Forum Posts.
They are represented in the following three UI panels from
left to right:
• Control Panel (Left) - contains a Search, three links
- Inheritance, Loops, Stackoverflow.com. Inheritance
and Loop links refreshes the section 3 with the
respective posts data. It also refreshes the section 2 TFM
bubbles. The search bar performs a normal search
against the data on the keywords fed into it.
• Analytics panel (Top Right) - This section
provides the result of our TFM model on the data
provided in section 3. The results are showcased in form
of bubble chart with some words mentioned in the
center of each bubble. These words in the bubble chart
are the most highlighted topics discovered by our
algorithm. The size variation of individual bubbles defines
the topic word relevance to the data i.e. Bigger the
circle, bigger is relation of data to that topic.</p>
      <p>The bubbles are sectioned into two die↵rent color codes
- one showing the topic related to the data and the
other showing topics which are not related. Our TFM
model clearly detects these di↵erences, we call them
facets and non facets. The bubble chart also changes
according to the link selected on the left i.e.
inheritance and loop. For inheritance the bubbles show
following TFM facets - class, inheritance, extend,
multiple, implement and following non-facets - if, call, type,
composite, problem, which. For loops the bubbles
show following TFM facets - for, do, loop, instance and
following non facets - time, compile, value, optimism,
variable. The TFM facets individually are clickable
and work like a tag selection. On click, the data in
section 3 gets sorted in descending order on the TFM
value of the bubble clicked.
• Forum posts (Bottom Right) - contains all the
forum posts data (question, its accepted answer (if
available) and the next top voted answer) on the topic
chosen in control panel, i.e., inheritance or loop. Each
post contains some text and code, if available. In
addition to the texts, each row also contains the TFM
bubble, again, the size of the bubble denoting the facet
relevance to the content of the post. The purpose of
associating each post with its TFM facets value is to
help users browse faster to find the related question to
their problem. Every row of question is expandable.
Once the user finds a related question to his problem,
he can click on it to reveal its answer.</p>
      <p>INSIGHT has been developed on Django and Python
(interpreted languages) therefore, it can be scaled for larger data
sets without compromising on the processing time. The
architecture of the application has also been optimized to
handle larger data sets. Moreover, all the visualization on
the application is handled by javascript, therefore,
providing the facility to incorporate more chart visualization like
d3.js without worrying on the cost of eciency, as these are
well optimized javascripts designed to handle data sets of
any size.</p>
    </sec>
    <sec id="sec-7">
      <title>4.1 The Analytics</title>
      <p>4.1.1 Implementation
We implemented user tracking using Javascript on INSIGHTS.
Javascript o↵ers a quick and easy way to collect aggregate
data on users and is built into INSIGHT. The system as a
whole is a comprehensive logging system that tracks user’s
actions to a specific session. We also wish to provide a
debrief of the session to user for improving his learning.
There are multiple third party tracking tools for example
google analytics. But they all lack the ability to track an
individual user’s actions/decisions in chronological order. For
example, you could see user clicked on question 1 and 5 to
formulate his answer but with GA you cannot determine
whether question 1 was clicked first or the question 5. Also,
GA doesn’t provide all the analytics together and it requires
to be combined with other analytical tools to provide the full
comprehensive logging system.</p>
      <p>Because the order of actions is especially crucial in analytics,
we built a new feature for INSIGHT to track all of user’s
actions in a log, which includes several pieces of information:
• What action they performed
1. Mouse click on the page
2. Scrolling up or down
3. Which buttons were clicked
4. What text were highlighted</p>
      <sec id="sec-7-1">
        <title>5. Which keywords were used in search bar</title>
      </sec>
      <sec id="sec-7-2">
        <title>6. Which questions were expanded for answers</title>
      </sec>
      <sec id="sec-7-3">
        <title>7. Which TFM bubble did the user click on to sort the data.</title>
        <p>• When they performed the action
• On which page they performed the action
Furthermore, we added a tracking feature on User study
page as well for all the decisions that the user makes during
answering the questions. This feature tracks when a
question was answered and which question was answered first.
All of the information from in-application actions and from
the user study page are recorded continuously throughout
the session. The data is stored for further aggregate analysis
and research.
4.1.2 Benefits and applications
The tracking/logging feature built in the application allows
us to drill down and filter by any of the levels, so we can
easily see which actions were performed on which page and
at what time. This also allow us to identify the common
mistakes and patterns users follow during finding an answer
to his coding problem. These mistakes or patterns are then
to be addressed with further analysis and research and then
built into the application to improve user learning.
The data can also be filtered over date, so further analysis
can also be done to study the change of user’s understanding
over time, which may also be correlated with improvements
in learner’s knowledge.
google and stackoverflow and if he does then how well he is
involved in the process.
5.
5.1</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>USER STUDY</title>
    </sec>
    <sec id="sec-9">
      <title>The Design</title>
      <p>The user study has been designed to test the functional
application of INSIGHT and its eciency against other public
online forums. For this particular case study, we use
’Stackoverflow.com’ to do comparative study. Table 2. displays
our study design with four sets of control environment to
test the application thoroughly.
• Control 1 - user will answer the question of the
respective section using help from Stackoverflow.com.
• Control 0 - user is not allowed to refer
Stackoverflow.com for solving the problem.</p>
      <p>Though the experiment group and control 0 group use the
same approach to answer the problem in hand i.e. referring
to visual analytics for help, they have been defined as
different set as the experiment group will access programming
help through visual analytics interface only and the control
group may get access to programming help through
Stackoverflow.com depending upon which control group it refers
to.
5.2</p>
    </sec>
    <sec id="sec-10">
      <title>Study Procedure</title>
      <p>Background survey is all about knowing the user’s
knowledge level in the area of coding and also involves asking him
how well he is versed with online help i.e. does he uses
The Q&amp; A involves asking user two questions - one on topic
loops and the other on topic inheritance. The user is
required to answer both of the questions by referring to
INSIGHT or stackoverflow.com (depending upon which control
group the user belongs to). This task is time bound with 10
minutes allotted to each individual question adding it up to
20 minutes in total.</p>
      <p>Post completion of the questions, the user is asked to
provide a post survey to get their feedback to help improve the
application. Post survey is the normal feedback system with
users being asked to rate our application on the scale of 1 to
5 (where, 1-very bad and 5-excellent) on satisfaction, ease of
use, ease of learning and usefulness. Users are also provided
a space to give any comments on how can the application
be improved. All of this data with user actions are stored in
the database and later will be used to run more experiments
using hidden topic markov model to find out how
constructive the user responses are(Jeong, Gupta, Roscoe, Wagster,
Biswas, Schwartz)</p>
      <p>We sampled one year (year 2013) of forum posts in topic
Java from stackoverflow site through StackExchange API.
The data pool was selected from the top 10 frequent tagged
questions due to most of the posts in this section contained
at least one accepted answer. For our case, we only show
top 2 frequent tagged out of those 10 i.e. ’Inheritance’ and
’Loops’. It will allow us to build a baseline to test INSIGHT
on smaller set of data and also it’s e↵ectiveness. Later, the
application will be scaled up to include all frequent tagged
topics and questions.</p>
    </sec>
    <sec id="sec-11">
      <title>6.2 User-Study Evaluation</title>
      <p>INSIGHT version 1 prototype was recently developed and
there are many use cases and further user studies underway.
Till now, we have conducted 4 user study testing all four
combinations of control environment as shown in Table 2.
As the number of users were limited, we provide a qualitative
evaluation of our application.</p>
      <p>On the base of the background information provided by the
users, the users can be clearly divided into two sets - 1.
Users with some programming experience and 2. Users with
no programming experience. Each set contained 2 users each
and these sets were formed completely on the basis of how
well they knew coding and how well they are familiar with
the online coding forums.</p>
      <p>The users were presented with same set of two questions - a
easy problem on topic loops and a slightly dicult problem
on topic inheritance. Figure 5 and 6 shows the snippet of
the questions.</p>
      <p>Based on the control group users were required to access
the respective resources and answer the questions. Out of
the four, two users were able to answer both the question,
whereas other two were only able to answer question on topic
loops. Moreover, the two users who were able to answer
both the question were the users who had some background
knowledge of coding and were involved in some online
discussion forums i.e. set-1. Because both the set involved
one individual case, where the user was allowed to access
’Stackoverflow.com’ i.e. Control 1, it comes as no surprise
that users with some background knowledge were easily able
to browse through the resources (Stackoverflow.com &amp;
INSIGHT) and find the solution and the other users weren’t.
User’s who failed to answer the problem on inheritance
belonged to set-2 i.e users with no background knowledge.
These users were not able to find the solution either on
Stackoverflow.com or on INSIGHT, which provides an
intuition whether users require some background knowledge
to find the solution or not. It also points to INSIGHT being
not so helpful for the users to find solution for the inheritance
question. This intuition and deduction has been followed on
very small dataset therefore it provides no concrete evidence
for whatsoever. To testify for the intuition we require more
rigorous testing and user studies.</p>
      <p>During the study, users used search and TFM tagging
facility extensively to find answer to the questions. Users found
TFM bubble chart helpful as it helped them browse through
the questions faster. The variation in the sizes of it assisted
them to relate to the relevance of the question more easily.
Search bar of the application worked in supplement with
the TFM bubble chart to help users find related questions,
hence the solution. The most frequent words searched for
the question loops were - ’break’, ’loops’ and for question
inheritance - ’extends’, ’compilation error’.</p>
      <p>Though the users liked the ease of use of the application,
they felt the need of visually improving the application on
the same lines. Collectively, INSIGHT was positively
received by the users.</p>
    </sec>
    <sec id="sec-12">
      <title>7. FUTURE DIRECTIONS &amp; DISCUSSIONS</title>
      <p>With so many variations and wideness in teaching style and
technology, finding out ways to make learning e↵ective and
interesting becomes quite a task. Here are some of the ways
we can lead INSIGHT in directions to make it more
personalized:
INSIGHT logs and stores all the user’s action on it with
individual timestamp of when they were performed. We can
filter this data by date, so further analysis can be done over
the change of providing an answer by respective users, which
may also be correlated with improvement in user’s
knowledge. Also, providing a dashboard for individual users to
track or debrief on there performance by reviewing their
answer and action logs can help users to gain deeper insight
into their conceptual learning level and also help them
review what data they used to formulate the answer. There
logs can also be then used for identifying the area of
weakness and then can be used by to provide more personalized
help.</p>
      <p>An ability to provide and instant feedback based on the
user’s action is very conducive to the improvement in user’s
knowledge or learning. This will also help users to form a
empathetic connection as providing instant feedback
stimulates a gesture of more personalization.</p>
    </sec>
    <sec id="sec-13">
      <title>8. LIMITATIONS</title>
      <p>In this paper we describe a functional prototype of visual
analytics tool - INSIGHTS for discourse centric content. Our
preliminary results demonstrated that INSIGHTS could be
a promising approach to help users really learn and
understand the concepts instead just writing the answers to
problems but there are several limitations in current
implementation. 1) The current version has been only tested for two
topics - Loops and Inheritance out of 10 topics that were
explicitly chosen to represent Easy &amp; Dicult topics for CS1
course. 2) The user study was only conducted with limited
subjects and requires more rigorous testing of our
application and also to aggregate quantifiable results to test our
hypotheses. 3) We currently only experimented the bubble
charts visual representation on the extracted content
semantics. We completely ignored the semantic relations, such as
the concept causal relations, sequential or network
visualizations.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Aleven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mclaren</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Roll</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Koedinger</surname>
          </string-name>
          .
          <article-title>Toward meta-cognitive tutoring: A model of help seeking with a cognitive tutor</article-title>
          .
          <source>International Journal of Artificial Intelligence in Education</source>
          ,
          <volume>16</volume>
          (
          <issue>2</issue>
          ):
          <fpage>101</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Anderson</surname>
          </string-name>
          and
          <string-name>
            <surname>E. Skwarecki.</surname>
          </string-name>
          <article-title>The automated tutoring of introductory computer programming</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>29</volume>
          (
          <issue>9</issue>
          ):
          <fpage>842</fpage>
          -
          <lpage>849</lpage>
          ,
          <year>1986</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Arnold</surname>
          </string-name>
          . Signals:
          <article-title>Applying academic analytics</article-title>
          .
          <source>Educause Quarterly</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ):n1,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Atkinson</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Renkl</surname>
          </string-name>
          .
          <article-title>Interactive example-based learning environments: Using interactive elements to encourage e↵ective processing of worked examples</article-title>
          .
          <source>Educational Psychology Review</source>
          ,
          <volume>19</volume>
          (
          <issue>3</issue>
          ):
          <fpage>375</fpage>
          -
          <lpage>386</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bacchelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ponzanelli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Lanza</surname>
          </string-name>
          .
          <article-title>Harnessing stack overflow for the ide</article-title>
          .
          <source>In Recommendation Systems for Software Engineering (RSSE)</source>
          ,
          <source>2012 Third International Workshop on</source>
          , pages
          <fpage>26</fpage>
          -
          <lpage>30</lpage>
          . IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Barnes</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Stamper</surname>
          </string-name>
          .
          <article-title>Toward automatic hint generation for logic proof tutoring using historical student data</article-title>
          .
          <source>In Intelligent Tutoring Systems</source>
          , pages
          <fpage>373</fpage>
          -
          <lpage>382</lpage>
          . Springer,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Blei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Ng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Jordan</surname>
          </string-name>
          .
          <article-title>Latent dirichlet allocation</article-title>
          .
          <source>the Journal of machine Learning research</source>
          ,
          <volume>3</volume>
          :
          <fpage>993</fpage>
          -
          <lpage>1022</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>K. E.</given-names>
            <surname>Boyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Phillips</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ingram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Y.</given-names>
            <surname>Ha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wallis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vouk</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lester</surname>
          </string-name>
          .
          <article-title>Investigating the relationship between dialogue structure and tutoring e↵ectiveness: a hidden markov modeling approach</article-title>
          .
          <source>International Journal of Artificial Intelligence in Education</source>
          ,
          <volume>21</volume>
          (
          <issue>1</issue>
          ):
          <fpage>65</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Brandt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dontcheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weskamp</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Klemmer</surname>
          </string-name>
          .
          <article-title>Example-centric programming: integrating web search into the development environment</article-title>
          .
          <source>In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          , pages
          <fpage>513</fpage>
          -
          <lpage>522</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E. H.</given-names>
            <surname>Chi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pirolli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Lam</surname>
          </string-name>
          .
          <article-title>Aspects of augmented social cognition: Social information foraging and social search</article-title>
          .
          <source>In Online Communities and Social Computing</source>
          , pages
          <fpage>60</fpage>
          -
          <lpage>69</lpage>
          . Springer,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dabbish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Stuart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tsay</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Herbsleb</surname>
          </string-name>
          .
          <article-title>Social coding in github: transparency and collaboration in an open software repository</article-title>
          .
          <source>In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work</source>
          , pages
          <fpage>1277</fpage>
          -
          <lpage>1286</lpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Dave</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wattenberg</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Muller</surname>
          </string-name>
          .
          <article-title>Flash forums and forumreader: navigating a new kind of large-scale online discussion</article-title>
          .
          <source>In Proceedings of the 2004 ACM conference on Computer supported cooperative work</source>
          , pages
          <fpage>232</fpage>
          -
          <lpage>241</lpage>
          . ACM,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>L.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. L.</given-names>
            <surname>Buntine</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Jin</surname>
          </string-name>
          .
          <article-title>Sequential latent dirichlet allocation: Discover underlying topic structures within a document</article-title>
          .
          <source>In Data Mining (ICDM)</source>
          ,
          <year>2010</year>
          IEEE 10th International Conference on, pages
          <fpage>148</fpage>
          -
          <lpage>157</lpage>
          . IEEE,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Goldman</surname>
          </string-name>
          , G. Little, and
          <string-name>
            <given-names>R. C.</given-names>
            <surname>Miller</surname>
          </string-name>
          .
          <article-title>Collabode: collaborative coding in the browser</article-title>
          .
          <source>In Proceedings of the 4th international workshop on Cooperative and human aspects of software engineering</source>
          , pages
          <fpage>65</fpage>
          -
          <lpage>68</lpage>
          . ACM,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Gretarsson</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <article-title>O'donovan</article-title>
          , S. Bostandjiev, T. Ho¨llerer,
          <string-name>
            <given-names>A.</given-names>
            <surname>Asuncion</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Newman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Smyth</surname>
          </string-name>
          . Topicnets:
          <article-title>Visual analysis of large text corpora with topic modeling</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology (TIST)</source>
          ,
          <volume>3</volume>
          (
          <issue>2</issue>
          ):
          <fpage>23</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>B. V.</given-names>
            <surname>Hanrahan</surname>
          </string-name>
          , G. Convertino, and
          <string-name>
            <given-names>L.</given-names>
            <surname>Nelson</surname>
          </string-name>
          .
          <article-title>Modeling problem diculty and expertise in stackoverflow</article-title>
          .
          <source>In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion</source>
          , pages
          <fpage>91</fpage>
          -
          <lpage>94</lpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Holmes</surname>
          </string-name>
          and
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Murphy</surname>
          </string-name>
          .
          <article-title>Using structural context to recommend source code examples</article-title>
          .
          <source>In Proceedings of the 27th international conference on Software engineering</source>
          , pages
          <fpage>117</fpage>
          -
          <lpage>125</lpage>
          . ACM,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I.-H.</given-names>
            <surname>Hsiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.-L.</given-names>
            <surname>Lin</surname>
          </string-name>
          .
          <article-title>Educational social linking in example authoring</article-title>
          .
          <source>In Proceedings of the nineteenth ACM conference on Hypertext and hypermedia</source>
          , pages
          <fpage>229</fpage>
          -
          <lpage>230</lpage>
          . ACM,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.-H.</given-names>
            <surname>Hsiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sosnovsky</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Brusilovsky</surname>
          </string-name>
          .
          <article-title>Guiding students to the right questions: adaptive navigation support in an e-learning system for java programming</article-title>
          .
          <source>Journal of Computer Assisted Learning</source>
          ,
          <volume>26</volume>
          (
          <issue>4</issue>
          ):
          <fpage>270</fpage>
          -
          <lpage>283</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jo</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Oh</surname>
          </string-name>
          .
          <article-title>Aspect and sentiment unification model</article-title>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A. J.</given-names>
            <surname>Ko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Myers</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Coblenz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Aung</surname>
          </string-name>
          .
          <article-title>An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks</article-title>
          .
          <source>Software Engineering</source>
          , IEEE Transactions on,
          <volume>32</volume>
          (
          <issue>12</issue>
          ):
          <fpage>971</fpage>
          -
          <lpage>987</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y.-J.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.-K.</given-names>
            <surname>Kim</surname>
          </string-name>
          , H.-G. Cho, and
          <string-name>
            <given-names>G.</given-names>
            <surname>Woo</surname>
          </string-name>
          .
          <article-title>Detecting and visualizing online dispute dynamics in replying comments</article-title>
          .
          <source>Software: Practice and Experience</source>
          ,
          <volume>43</volume>
          (
          <issue>12</issue>
          ):
          <fpage>1395</fpage>
          -
          <lpage>1413</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Cai</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Lian</surname>
          </string-name>
          .
          <article-title>Tiara: Interactive, topic-based visual text summarization and analysis</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology (TIST)</source>
          ,
          <volume>3</volume>
          (
          <issue>2</issue>
          ):
          <fpage>25</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>S. Y.</given-names>
            <surname>Lye</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. H. L.</given-names>
            <surname>Koh</surname>
          </string-name>
          .
          <article-title>Review on teaching and learning of computational thinking through programming: What is next for k-</article-title>
          12
          <source>? Computers in Human Behavior</source>
          ,
          <volume>41</volume>
          :
          <fpage>51</fpage>
          -
          <lpage>61</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mujumdar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kallenbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Hartmann</surname>
          </string-name>
          .
          <article-title>Crowdsourcing suggestions to programming problems for dynamic web development languages</article-title>
          .
          <source>In CHI'11 Extended Abstracts on Human Factors in Computing Systems</source>
          , pages
          <fpage>1525</fpage>
          -
          <lpage>1530</lpage>
          . ACM,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Nasehi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sillito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Maurer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Burns</surname>
          </string-name>
          .
          <article-title>What makes a good code example?: A study of programming q&amp;a in stackoverflow</article-title>
          .
          <source>In Software Maintenance (ICSM)</source>
          ,
          <year>2012</year>
          28th IEEE International Conference on, pages
          <fpage>25</fpage>
          -
          <lpage>34</lpage>
          . IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>C.</given-names>
            <surname>Piech</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sahami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Koller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Cooper</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Blikstein</surname>
          </string-name>
          .
          <article-title>Modeling how students learn to program</article-title>
          .
          <source>In Proceedings of the 43rd ACM technical symposium on Computer Science Education</source>
          , pages
          <fpage>153</fpage>
          -
          <lpage>160</lpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Robins</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rountree</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Rountree</surname>
          </string-name>
          .
          <article-title>Learning and teaching programming: A review and discussion</article-title>
          .
          <source>Computer Science Education</source>
          ,
          <volume>13</volume>
          (
          <issue>2</issue>
          ):
          <fpage>137</fpage>
          -
          <lpage>172</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Shum</surname>
          </string-name>
          et al.
          <source>Cohere: Towards web 2.0 argumentation. COMMA</source>
          ,
          <volume>8</volume>
          :
          <fpage>97</fpage>
          -
          <lpage>108</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>G.</given-names>
            <surname>Siemens and R. S. d Baker</surname>
          </string-name>
          .
          <article-title>Learning analytics and educational data mining: towards communication and collaboration</article-title>
          .
          <source>In Proceedings of the 2nd international conference on learning analytics and knowledge</source>
          , pages
          <fpage>252</fpage>
          -
          <lpage>254</lpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M.-A.</given-names>
            <surname>Storey</surname>
          </string-name>
          .
          <article-title>Theories, methods and tools in program comprehension: Past, present and future</article-title>
          .
          <source>In Program Comprehension</source>
          ,
          <year>2005</year>
          .
          <article-title>IWPC 2005</article-title>
          .
          <article-title>Proceedings</article-title>
          . 13th International Workshop on, pages
          <fpage>181</fpage>
          -
          <lpage>191</lpage>
          . IEEE,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>J.</given-names>
            <surname>Stylos</surname>
          </string-name>
          and
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Myers</surname>
          </string-name>
          .
          <article-title>Mica: A web-search tool for finding api components and examples</article-title>
          .
          <source>In Visual Languages and Human-Centric Computing</source>
          ,
          <year>2006</year>
          . VL/
          <article-title>HCC 2006</article-title>
          .
          <article-title>IEEE Symposium on</article-title>
          , pages
          <fpage>195</fpage>
          -
          <lpage>202</lpage>
          . IEEE,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>C.</given-names>
            <surname>Treude</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barzilay</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.-A.</given-names>
            <surname>Storey</surname>
          </string-name>
          .
          <article-title>How do programmers ask and answer questions on the web?: Nier track</article-title>
          .
          <source>In Software Engineering (ICSE)</source>
          ,
          <year>2011</year>
          33rd International Conference on, pages
          <fpage>804</fpage>
          -
          <lpage>807</lpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tsui</surname>
          </string-name>
          , S. EdTech, and
          <string-name>
            <given-names>J.</given-names>
            <surname>Benfield</surname>
          </string-name>
          . Brief.
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>C. van de Sande</surname>
            and
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Leinhard</surname>
          </string-name>
          .
          <article-title>Online tutoring in the calculus: Beyond the limit of the limit</article-title>
          .
          <source>education</source>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          ):
          <fpage>117</fpage>
          -
          <lpage>160</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>T.</given-names>
            <surname>VanDeGrift</surname>
          </string-name>
          .
          <article-title>Coupling pair programming and writing: learning about students' perceptions and processes</article-title>
          .
          <source>ACM SIGCSE Bulletin</source>
          ,
          <volume>36</volume>
          (
          <issue>1</issue>
          ):
          <fpage>2</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>B.</given-names>
            <surname>Vasilescu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Serebrenik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Devanbu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Filkov</surname>
          </string-name>
          .
          <article-title>How social q&amp;a sites are changing knowledge sharing in open source software communities</article-title>
          .
          <source>In Proceedings of the 17th ACM conference on Computer supported cooperative work &amp; social computing</source>
          , pages
          <fpage>342</fpage>
          -
          <lpage>354</lpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>J.</given-names>
            <surname>Vassileva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutwin</surname>
          </string-name>
          , et al.
          <article-title>Exploring blog archives with interactive visualization</article-title>
          .
          <source>In Proceedings of the working conference on Advanced visual interfaces</source>
          , pages
          <fpage>39</fpage>
          -
          <lpage>46</lpage>
          . ACM,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>K.</given-names>
            <surname>Verbert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Duval</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Klerkx</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Govaerts</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Santos</surname>
          </string-name>
          .
          <article-title>Learning analytics dashboard applications</article-title>
          . American Behavioral Scientist, page
          <volume>0002764213479363</volume>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>F.</given-names>
            <surname>Wei</surname>
          </string-name>
          , S. Liu,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Tan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          . Tiara:
          <article-title>a visual exploratory text analytic system</article-title>
          .
          <source>In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          , pages
          <fpage>153</fpage>
          -
          <lpage>162</lpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Wise</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. N.</given-names>
            <surname>Hausknecht</surname>
          </string-name>
          .
          <article-title>Learning analytics for online discussions: a pedagogical model for intervention with embedded and extracted analytics</article-title>
          .
          <source>In Proceedings of the Third International Conference on Learning Analytics and Knowledge</source>
          , pages
          <fpage>48</fpage>
          -
          <lpage>56</lpage>
          . ACM,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>T.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zeller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Weissgerber</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Diehl</surname>
          </string-name>
          .
          <article-title>Mining version histories to guide software changes</article-title>
          .
          <source>Software Engineering</source>
          , IEEE Transactions on,
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>