{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:41:38Z","timestamp":1768412498789,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":193,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,27]]},"DOI":"10.1145\/3571785.3574129","type":"proceedings-article","created":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T18:50:15Z","timestamp":1672339815000},"page":"261-292","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Stop Reinventing the Wheel! Promoting Community Software in Computing Education"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2995-5102","authenticated-orcid":false,"given":"Jeremiah","family":"Blanchard","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8305-325X","authenticated-orcid":false,"given":"John R.","family":"Hott","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7271-4027","authenticated-orcid":false,"given":"Vincent","family":"Berry","sequence":"additional","affiliation":[{"name":"LIRMM - Univ Montpellier, CNRS, Montpellier, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5606-4140","authenticated-orcid":false,"given":"Rebecca","family":"Carroll","sequence":"additional","affiliation":[{"name":"Full Sail University, Winter Park, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5861-1029","authenticated-orcid":false,"given":"Bob","family":"Edmison","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8996-0221","authenticated-orcid":false,"given":"Richard","family":"Glassey","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4930-6249","authenticated-orcid":false,"given":"Oscar","family":"Karnalim","sequence":"additional","affiliation":[{"name":"University of Newcastle, Callaghan, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0078-3653","authenticated-orcid":false,"given":"Brian","family":"Plancher","sequence":"additional","affiliation":[{"name":"Barnard College, Columbia University, New York City, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1992-8303","authenticated-orcid":false,"given":"Se\u00e1n","family":"Russell","sequence":"additional","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2022,12,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.13140\/2.1.1065.0564"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499304"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.02.025"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3286960.3286974"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2828959.2828969"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844712"},{"key":"e_1_3_2_1_8_1","first-page":"2","article-title":"Experiences Offering an Online Version of Computer Science Support (Peer Tutoring) to Undergraduate Computer Science Majors in the Era of COVID-19","volume":"36","author":"Assiter Karina","year":"2020","unstructured":"Karina Assiter . 2020 . Experiences Offering an Online Version of Computer Science Support (Peer Tutoring) to Undergraduate Computer Science Majors in the Era of COVID-19 . J. Comput. Sci. Coll. , Vol. 36 , 2 (oct 2020), 96--107. Karina Assiter. 2020. Experiences Offering an Online Version of Computer Science Support (Peer Tutoring) to Undergraduate Computer Science Majors in the Era of COVID-19. J. Comput. Sci. Coll. , Vol. 36, 2 (oct 2020), 96--107.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3325917.3325929"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831425.2831427"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.20380\/GI1973.04"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287458"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4018\/978--1--7998--5351-0.ch025"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358711.3361630"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse-seet.2019.00027"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2591721"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524753"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BB48857.2019.8941213"},{"key":"e_1_3_2_1_19_1","volume-title":"Number 1. Evaluation comment","author":"Bloom Benjamin S","year":"1968","unstructured":"Benjamin S Bloom . 1968. Learning for Mastery. Instruction and Curriculum. Regional Education Laboratory for the Carolinas and Virginia, Topical Papers and Reprints , Number 1. Evaluation comment , Vol. 1 , 2 ( 1968 ), n2. Benjamin S Bloom. 1968. Learning for Mastery. Instruction and Curriculum. Regional Education Laboratory for the Carolinas and Virginia, Topical Papers and Reprints, Number 1. Evaluation comment, Vol. 1, 2 (1968), n2."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445265"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328529.3328564"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345252.3345300"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524760"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.56"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2713609.2713611"},{"key":"e_1_3_2_1_27_1","unstructured":"Yoann Buch Yiquan Zhou and Tair Sabirgaliev. 2016. Flow. http:\/\/findtheflow.io  Yoann Buch Yiquan Zhou and Tair Sabirgaliev. 2016. Flow. http:\/\/findtheflow.io"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844635"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110248"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344263"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3439579"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477282.3477290"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450296"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069367"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2874315"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466127"},{"key":"e_1_3_2_1_38_1","volume-title":"Search Engines: Information Retrieval in Practice.","author":"Croft W Bruce","year":"2010","unstructured":"W Bruce Croft , Donald Metzler , and Trevor Strohman . 2010 . Search Engines: Information Retrieval in Practice. W Bruce Croft, Donald Metzler, and Trevor Strohman. 2010. Search Engines: Information Retrieval in Practice."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2539028"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157180"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593897"},{"key":"e_1_3_2_1_42_1","first-page":"8","article-title":"Jupyter Notebooks versus a Textbook in a Big Data Course","volume":"35","author":"DePratti Roland","year":"2020","unstructured":"Roland DePratti . 2020 . Jupyter Notebooks versus a Textbook in a Big Data Course . J. Comput. Sci. Coll. , Vol. 35 , 8 (apr 2020), 208--220. Roland DePratti. 2020. Jupyter Notebooks versus a Textbook in a Big Data Course. J. Comput. Sci. Coll. , Vol. 35, 8 (apr 2020), 208--220.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_43_1","volume-title":"2nd Conference of HERDSA (The Higher Education Research and Development Society of Australasia). 7--10","author":"Dougiamas Martin","year":"2002","unstructured":"Martin Dougiamas and Peter C Taylor . 2002 . Interpretive Analysis of an Internet-based Course Constructed using a New Courseware Tool called Moodle . In 2nd Conference of HERDSA (The Higher Education Research and Development Society of Australasia). 7--10 . Martin Dougiamas and Peter C Taylor. 2002. Interpretive Analysis of an Internet-based Course Constructed using a New Courseware Tool called Moodle. In 2nd Conference of HERDSA (The Higher Education Research and Development Society of Australasia). 7--10."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569808"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the International Conference on Education and Information Systems: Technologies and Applications (EISTA'03)","author":"Edwards Stephen H","year":"2003","unstructured":"Stephen H Edwards . 2003 . Using test-driven development in the classroom: Providing students with concrete feedback on performance . In Proceedings of the International Conference on Education and Information Systems: Technologies and Applications (EISTA'03) . Stephen H Edwards. 2003. Using test-driven development in the classroom: Providing students with concrete feedback on performance. In Proceedings of the International Conference on Education and Information Systems: Technologies and Applications (EISTA'03)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556325.2567888"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287487"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369255.3369257"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.01.018"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485760.2485785"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/364914.364937"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.10"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159515"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2729094.2742588"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159629"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3017680.3017691"},{"key":"e_1_3_2_1_57_1","unstructured":"David Galles. 2011. Data Structure Visualizations. https:\/\/www.cs.usfca.edu\/ galles\/visualization\/index.html  David Galles. 2011. Data Structure Visualizations. https:\/\/www.cs.usfca.edu\/ galles\/visualization\/index.html"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478432.3499221"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432571"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844668"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2677336"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325352"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702295"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/299649.299783"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341525.3393999"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299046"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3372670"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3523132.3523137"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445368"},{"key":"e_1_3_2_1_70_1","volume-title":"Victor Bo, Huai Loh, and Felix Halim.","author":"Halim Steven","year":"2012","unstructured":"Steven Halim , Zi Chun Koh , Victor Bo, Huai Loh, and Felix Halim. 2012 . Learning Algorithms with Unified and Interactive Web-Based Visualization . , 53--68 pages. http:\/\/www.comp.nus.edu.sg\/ Steven Halim, Zi Chun Koh, Victor Bo, Huai Loh, and Felix Halim. 2012. Learning Algorithms with Unified and Interactive Web-Based Visualization. , 53--68 pages. http:\/\/www.comp.nus.edu.sg\/"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445507"},{"key":"e_1_3_2_1_72_1","volume-title":"Proceeding of the 44th ACM technical symposium on Computer science education. 759--759.","author":"Harvey Brian","unstructured":"Brian Harvey , Daniel D Garcia , Tiffany Barnes , Nathaniel Titterton , Daniel Armendariz , Luke Segars , Eugene Lemon , Sean Morris , and Josh Paley . 2013b. Snap!(build your own blocks). In Proceeding of the 44th ACM technical symposium on Computer science education. 759--759. Brian Harvey, Daniel D Garcia, Tiffany Barnes, Nathaniel Titterton, Daniel Armendariz, Luke Segars, Eugene Lemon, Sean Morris, and Josh Paley. 2013b. Snap!(build your own blocks). In Proceeding of the 44th ACM technical symposium on Computer science education. 759--759."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEED.2018.8626899"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpa.2020.100034"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406262"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/367415.367422"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460296.2460350"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISET.2015.41"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/0360--1315(93)90086-X"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159566"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/374685.374787"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360--1315(96)00025--5"},{"key":"e_1_3_2_1_83_1","volume-title":"Software Abstractions: logic, language, and analysis","author":"Jackson Daniel","unstructured":"Daniel Jackson . 2012. Software Abstractions: logic, language, and analysis . MIT press . Daniel Jackson. 2012. Software Abstractions: logic, language, and analysis. MIT press."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2411"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1163405.1163407"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197094"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197094"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724660.2728702"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126632"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462487"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3073703"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE48000.2019.9225953"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.22553"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2017.8117201"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON52537.2022.9766697"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366920"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITHET.2015.7218037"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-014-0274--7"},{"key":"e_1_3_2_1_102_1","unstructured":"Gregor Kotainy and Olaf Spinczyk. 2014. AnimOS CPU-Scheduling. https:\/\/ess.cs.tu-dortmund.de\/Software\/AnimOS\/CPU-Scheduling\/  Gregor Kotainy and Olaf Spinczyk. 2014. AnimOS CPU-Scheduling. https:\/\/ess.cs.tu-dortmund.de\/Software\/AnimOS\/CPU-Scheduling\/"},{"key":"e_1_3_2_1_103_1","unstructured":"Andrew Kuo Lexseal Lin Diana Issatayeva and Mia Minnes. 2022. Flap.js. https:\/\/github.com\/flapjs  Andrew Kuo Lexseal Lin Diana Issatayeva and Mia Minnes. 2022. Flap.js. https:\/\/github.com\/flapjs"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502717.3532163"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400412331363843"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2580058"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2007.09.005"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET.2019.00022"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591708.2602663"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2899425"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102690"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306500.3306540"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899475.2899485"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366954"},{"key":"e_1_3_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287505"},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6684936"},{"key":"e_1_3_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366947"},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366947"},{"key":"e_1_3_2_1_119_1","volume-title":"Discoverability: Toward a Definition of Content Discovery Through Platforms","author":"McKelvey Fenwick","year":"2019","unstructured":"Fenwick McKelvey and Robert Hunt . 2019 . Discoverability: Toward a Definition of Content Discovery Through Platforms . Social Media Society , Vol . 5, 1 (2019). https:\/\/doi.org\/10.1177%2F2056305118819188 Fenwick McKelvey and Robert Hunt. 2019. Discoverability: Toward a Definition of Content Discovery Through Platforms. Social Media Society, Vol. 5, 1 (2019). https:\/\/doi.org\/10.1177%2F2056305118819188"},{"key":"e_1_3_2_1_120_1","unstructured":"Dhruv Misra. 2020. Pathfinding Visualizer in 3D. https:\/\/github.com\/dhruvmisra\/Pathfinding-Visualizer-ThreeJS%0A  Dhruv Misra. 2020. Pathfinding Visualizer in 3D. https:\/\/github.com\/dhruvmisra\/Pathfinding-Visualizer-ThreeJS%0A"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9273992"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3439586"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom50765.2020.9237855"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714569"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3350768.3351303"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/989863.989928"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818314.2818338"},{"key":"e_1_3_2_1_128_1","unstructured":"Nate Murray and Ari Lerner. 2013. Choc Traceable Programming. https:\/\/www.newline.co\/choc\/  Nate Murray and Ari Lerner. 2013. Choc Traceable Programming. https:\/\/www.newline.co\/choc\/"},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313290"},{"key":"e_1_3_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567429.2567446"},{"key":"e_1_3_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358711.3361627"},{"key":"e_1_3_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3513140"},{"key":"e_1_3_2_1_133_1","unstructured":"Bruno Papa. 2020. Recursion Tree Visualizer. https:\/\/recursion.vercel.app\/  Bruno Papa. 2020. Recursion Tree Visualizer. https:\/\/recursion.vercel.app\/"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131397"},{"key":"e_1_3_2_1_135_1","unstructured":"Diane Peters. 2021. Learning management systems are more important than ever. https:\/\/www.universityaffairs.ca\/features\/feature-article\/learning-management-systems-are-more-important-than-ever\/ Retrieved 2022-07-08 from  Diane Peters. 2021. Learning management systems are more important than ever. https:\/\/www.universityaffairs.ca\/features\/feature-article\/learning-management-systems-are-more-important-than-ever\/ Retrieved 2022-07-08 from"},{"key":"e_1_3_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3293867"},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287507"},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIET55102.2022.9779045"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141880.3141890"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366928"},{"key":"e_1_3_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377814.3381705"},{"key":"e_1_3_2_1_142_1","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","unstructured":"Lutz Prechelt , Guido Malpohl , and Michael Philippsen . 2002 . Finding plagiarisms among a set of programs with JPlag . Journal of Universal Computer Science , Vol. 8 , 11 (2002). Lutz Prechelt, Guido Malpohl, and Michael Philippsen. 2002. Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science , Vol. 8, 11 (2002).","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368308.3415369"},{"key":"e_1_3_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3162232"},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844593"},{"key":"e_1_3_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377814.3381712"},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432484"},{"key":"e_1_3_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592779"},{"key":"e_1_3_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978249.2978265"},{"key":"e_1_3_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/2662253.2662346"},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2466521"},{"key":"e_1_3_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/343048.343069"},{"key":"e_1_3_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9273892"},{"key":"e_1_3_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/3456565.3460054"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498343.3498347"},{"key":"e_1_3_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/3231644.3231708"},{"key":"e_1_3_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344286"},{"key":"e_1_3_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2850505"},{"key":"e_1_3_2_1_161_1","unstructured":"R Benjamin Shapiro Annie Kelly Matthew Ahrens and Rebecca Fiebrink. 2016. BlockyTalky: A physical and distributed computer music toolkit for kids. NIME.  R Benjamin Shapiro Annie Kelly Matthew Ahrens and Rebecca Fiebrink. 2016. BlockyTalky: A physical and distributed computer music toolkit for kids. NIME."},{"key":"e_1_3_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345002.3349288"},{"key":"e_1_3_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344076"},{"key":"e_1_3_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502870.3506565"},{"key":"e_1_3_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437800.3439201"},{"key":"e_1_3_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2016.24"},{"key":"e_1_3_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401796.2401799"},{"key":"e_1_3_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159468"},{"key":"e_1_3_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490822"},{"key":"e_1_3_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490822"},{"key":"e_1_3_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445511"},{"key":"e_1_3_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511861.3511885"},{"key":"e_1_3_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1145\/3306500.3306504"},{"key":"e_1_3_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430665.3456387"},{"key":"e_1_3_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157298"},{"key":"e_1_3_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538891"},{"key":"e_1_3_2_1_177_1","first-page":"1","article-title":"DESvisual: A Visualization Tool for the DES Cipher","volume":"27","author":"Tao Jun","year":"2011","unstructured":"Jun Tao , Jun Ma , Jean Mayo , Ching-Kuang Shene , and Melissa Keranen . 2011 . DESvisual: A Visualization Tool for the DES Cipher . J. Comput. Sci. Coll. , Vol. 27 , 1 (oct 2011), 81--89. Jun Tao, Jun Ma, Jean Mayo, Ching-Kuang Shene, and Melissa Keranen. 2011. DESvisual: A Visualization Tool for the DES Cipher. J. Comput. Sci. Coll. , Vol. 27, 1 (oct 2011), 81--89.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157136.2157295"},{"key":"e_1_3_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159572"},{"key":"e_1_3_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT52517.2021.00026"},{"key":"e_1_3_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676723.2691871"},{"key":"e_1_3_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3372599"},{"key":"e_1_3_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481282.3481287"},{"key":"e_1_3_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430665.3456367"},{"key":"e_1_3_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512276.2512279"},{"key":"e_1_3_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/3051457.3051469"},{"key":"e_1_3_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236525"},{"key":"e_1_3_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISET.2019.00046"},{"key":"e_1_3_2_1_189_1","first-page":"2","article-title":"Using Sharepoint as a Limited Learning Management System","volume":"32","author":"Worobec Bruce","year":"2016","unstructured":"Bruce Worobec and Robert Bryant . 2016 . Using Sharepoint as a Limited Learning Management System . J. Comput. Sci. Coll. , Vol. 32 , 2 (dec 2016), 11--18. Bruce Worobec and Robert Bryant. 2016. Using Sharepoint as a Limited Learning Management System. J. Comput. Sci. Coll. , Vol. 32, 2 (dec 2016), 11--18.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2015.11"},{"key":"e_1_3_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510309.3510318"},{"key":"e_1_3_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCCIC.2018.8584553"},{"key":"e_1_3_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3372634"}],"event":{"name":"ITiCSE 2022: Innovation and Technology in Computer Science Education","location":"Dublin Ireland","acronym":"ITiCSE 2022","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 2022 Working Group Reports on Innovation and Technology in Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571785.3574129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571785.3574129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:33Z","timestamp":1750182573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571785.3574129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,27]]},"references-count":193,"alternative-id":["10.1145\/3571785.3574129","10.1145\/3571785"],"URL":"https:\/\/doi.org\/10.1145\/3571785.3574129","relation":{},"subject":[],"published":{"date-parts":[[2022,12,27]]},"assertion":[{"value":"2022-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}