{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:52:05Z","timestamp":1755838325939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,11,8]],"date-time":"2012-11-08T00:00:00Z","timestamp":1352332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,11,8]]},"DOI":"10.1145\/2481449.2481460","type":"proceedings-article","created":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T19:47:45Z","timestamp":1367437665000},"page":"40-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Uncovering structure behind function"],"prefix":"10.1145","author":[{"given":"Carsten","family":"Schulte","sequence":"first","affiliation":[{"name":"Freie Universit\u00e4t Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24722-4_7"},{"key":"e_1_3_2_1_2_1","unstructured":"Bell T. and Newton H. 2013. Unplugging Computer Science. Improving Computer Science Education. D. Kadijevich et al. eds. Routledge. 66--82.  Bell T. and Newton H. 2013. Unplugging Computer Science. Improving Computer Science Education . D. Kadijevich et al. eds. Routledge. 66--82."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352782.1352784"},{"key":"e_1_3_2_1_4_1","volume-title":"Data Protection: Betrayed by our own data. Die Zeit.","author":"Biermann K.","year":"2011","unstructured":"Biermann , K. 2011 . Data Protection: Betrayed by our own data. Die Zeit. Biermann, K. 2011. Data Protection: Betrayed by our own data. Die Zeit."},{"volume-title":"Workshop 2006 - Accepted Papers: http:\/\/www.bwinf.de\/competition-workshop\/papers.html. Accessed: 2012-01-13","author":"Competition","key":"e_1_3_2_1_5_1","unstructured":"Competition Workshop 2006 - Accepted Papers: http:\/\/www.bwinf.de\/competition-workshop\/papers.html. Accessed: 2012-01-13 . Competition Workshop 2006 - Accepted Papers: http:\/\/www.bwinf.de\/competition-workshop\/papers.html. Accessed: 2012-01-13."},{"key":"e_1_3_2_1_6_1","unstructured":"Computer Science for Fun - cs4fn: HOME: http:\/\/www.cs4fn.org\/. Accessed: 2012-01-13.  Computer Science for Fun - cs4fn: HOME: http:\/\/www.cs4fn.org\/. Accessed: 2012-01-13."},{"key":"e_1_3_2_1_7_1","unstructured":"Computer Science Unplugged: http:\/\/csunplugged.org\/. Accessed: 2012-01-13.  Computer Science Unplugged: http:\/\/csunplugged.org\/. Accessed: 2012-01-13."},{"key":"e_1_3_2_1_8_1","unstructured":"Crutzen C. K. M. 2000. Interaction a world of differences. A vision on informatics from the perspective of gender studies. Open Universiteit Nederland.  Crutzen C. K. M. 2000. Interaction a world of differences. A vision on informatics from the perspective of gender studies . Open Universiteit Nederland."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1562877.1562911"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999817"},{"key":"e_1_3_2_1_11_1","volume-title":"Martin et al","author":"Feuz","year":"2011","unstructured":"Feuz , Martin et al . 2011 . Personal Web searching in the age of semantic capitalism: Diagnosing the mechanisms of personalisation. First Monday . 16, 2 (2011). Feuz, Martin et al. 2011. Personal Web searching in the age of semantic capitalism: Diagnosing the mechanisms of personalisation. First Monday. 16, 2 (2011)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015884"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/961511.961542"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734413"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915355_10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217672"},{"key":"e_1_3_2_1_17_1","unstructured":"Knobelsdorf M. 2011. Biographische Lern- und Bildungsprozesse im Handlungskontext der Computernutzung. Freie Universit\u00e4t Berlin.  Knobelsdorf M. 2011. Biographische Lern- und Bildungsprozesse im Handlungskontext der Computernutzung . Freie Universit\u00e4t Berlin."},{"key":"e_1_3_2_1_18_1","first-page":"11","article-title":"Breaking paragraphs into lines. Software","volume":"11","author":"Knuth D. E.","year":"1981","unstructured":"Knuth , D. E. and Plass , M. F. 1981 . Breaking paragraphs into lines. Software : Practice and Experience. 11 , 11 (Nov. 1981), 1119--1184. Knuth, D. E. and Plass, M. F. 1981. Breaking paragraphs into lines. Software: Practice and Experience. 11, 11 (Nov. 1981), 1119--1184.","journal-title":"Practice and Experience."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(01)00039-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1750888.1750893"},{"key":"e_1_3_2_1_21_1","first-page":"2","article-title":"The Tip of the Iceberg","volume":"39","author":"Littlejohn A.","year":"2008","unstructured":"Littlejohn , A. 2008 . The Tip of the Iceberg : Factors Affecting Learner Motivation. RELC Journal. 39 , 2 (Aug. 2008), 214--225. Littlejohn, A. 2008. The Tip of the Iceberg: Factors Affecting Learner Motivation. RELC Journal. 39, 2 (Aug. 2008), 214--225.","journal-title":"Factors Affecting Learner Motivation. RELC Journal."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868358.1868363"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/356835.356841"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Twelfth Australasian Conference on Computing Education -","volume":"103","author":"McLachlan C.","year":"2010","unstructured":"McLachlan , C. et al. 2010. Student perceptions of ICT: a gendered analysis . Proceedings of the Twelfth Australasian Conference on Computing Education - Volume 103 (Darlinghurst, Australia, Australia , 2010 ), 127--136. McLachlan, C. et al. 2010. Student perceptions of ICT: a gendered analysis. Proceedings of the Twelfth Australasian Conference on Computing Education - Volume 103 (Darlinghurst, Australia, Australia, 2010), 127--136."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.85.3.424"},{"volume-title":"Information, (Multi-) Media","author":"Studie","key":"e_1_3_2_1_26_1","unstructured":"MPFS 2011. JIM- Studie 2011 : Jugend , Information, (Multi-) Media ; Basisuntersuchung zum Medienumgang 12-- bis 19j\u00e4hriger. Medienp\u00e4dagogischer Forschungsverbund S\u00fcdwest . MPFS 2011. JIM-Studie 2011: Jugend, Information, (Multi-) Media; Basisuntersuchung zum Medienumgang 12-- bis 19j\u00e4hriger. Medienp\u00e4dagogischer Forschungsverbund S\u00fcdwest."},{"key":"e_1_3_2_1_27_1","unstructured":"Official Google Blog: The bright side of sitting in traffic: Crowdsourcing road congestion data: http:\/\/googleblog.blogspot.com\/2009\/08\/bright-side-of-sitting-in-traffic.html. Accessed: 2012-01-05.  Official Google Blog: The bright side of sitting in traffic: Crowdsourcing road congestion data: http:\/\/googleblog.blogspot.com\/2009\/08\/bright-side-of-sitting-in-traffic.html. Accessed: 2012-01-05."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2007.06.009"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734263.1734336"},{"key":"e_1_3_2_1_30_1","unstructured":"Redaktion Schulprojekt Mobilfunk 2008. Mobilfunk und Technik. F\u00e4cher\u00fcbergreifende Sachinformationen f\u00fcr projektorientiertes Lernen. Klassen 5--10 sowie gymnasiale Oberstufe. Informationszentrum Mobilfunk e. V.  Redaktion Schulprojekt Mobilfunk 2008. Mobilfunk und Technik. F\u00e4cher\u00fcbergreifende Sachinformationen f\u00fcr projektorientiertes Lernen. Klassen 5--10 sowie gymnasiale Oberstufe . Informationszentrum Mobilfunk e. V."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69924-8_10"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288580.1288585"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089786.1089800"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/6592.6594"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2160547.2160551"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157281"}],"event":{"name":"WIPSCE '12: Workshop in Primary and Secondary Computing Education","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Hamburg Germany","acronym":"WIPSCE '12"},"container-title":["Proceedings of the 7th Workshop in Primary and Secondary Computing Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2481449.2481460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2481449.2481460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:15Z","timestamp":1750235955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2481449.2481460"}},"subtitle":["the experiment as teaching method in computer science education"],"short-title":[],"issued":{"date-parts":[[2012,11,8]]},"references-count":36,"alternative-id":["10.1145\/2481449.2481460","10.1145\/2481449"],"URL":"https:\/\/doi.org\/10.1145\/2481449.2481460","relation":{},"subject":[],"published":{"date-parts":[[2012,11,8]]},"assertion":[{"value":"2012-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}