Papers by Michael J Oudshoorn

As scientific models and analysis tools become increasingly complex, they allow researchers to ma... more As scientific models and analysis tools become increasingly complex, they allow researchers to manipulate larger, richer, and more finely-grained datasets, often gathered from diverse sources. These complex models provide scientists with the opportunity to investigate phenomena in much greater depth, but this additional power is not without cost. Often this cost is expressed in the time required on the part of the researcher to find, gather, and transform the data necessary to satisfy the appetites of their data-hungry computation tools, and this is time that could clearly be better spent analyzing results. In many cases, even determining if a data source holds any relevant data requires a time-consuming manual search, followed by a conversion process in order to view the data. It is also commonly the case that as researchers spend time searching for and reformatting data, the expensive data processing hardware remains underutilized. Clearly this is not an efficient use of either research time or hardware. This research effort addresses this problem by providing a Transformation Manager which leverages the knowledge of a group of users, ensuring that once a method for a data transformation has been defined, either through automated processes or by any single member of the group, it can be automatically applied to similar future datasets by all members of the group. In addition to the use of existing transformation tools for well known data formats, methods by which new transformation can be automatically generated for previously unencountered data formats are developed and discussed. A major deliverable for this work is a prototype Transformation Manger, which implements these methods to allow data consumers to focus on their primary research mission, as opposed to the mechanics of dataset identification, acquisition, and transformation.
Michael J. Oudshoorn and Henry Detmoldhttp://internetconferences.net/pastattendees/Italija2000/We... more Michael J. Oudshoorn and Henry Detmoldhttp://internetconferences.net/pastattendees/Italija2000/Welcome.pd
Journal of Computing Sciences in Colleges, May 1, 2018
Few career paths have experienced a period of growth that compares to that which has engulfed the... more Few career paths have experienced a period of growth that compares to that which has engulfed the world of cybersecurity over the past 10 years, and few can match the field's expected employment growth looking forward. In response to this overwhelming demand for graduates trained to help secure our computing infrastructure, universities are moving to meet this need. While the speed and depth of the response has varied dramatically between institutions, there is now a definite trend of schools creating new courses, certificates, emphasis areas, and degree programs for both undergraduate and graduate students. While curriculum guidelines are beginning to appear from organizations such as ACM and ABET, schools are still struggling to determine just what path they will follow in developing their flavor of cybersecurity program.
Journal of Computing Sciences in Colleges, May 1, 2017
This paper examines project-based software engineering courses in several contexts in several cou... more This paper examines project-based software engineering courses in several contexts in several countries and makes observations regarding the success of the various pathways to the courses relative to the educa-tional context. The countries examined include Australia, Singapore, Malaysia and the US. The approaches considered include a semester-long project-based delivery, compressed delivery over three 3-day sessions, and articulation into a program from another country. The different backgrounds and performance of the students are examined.
2020 ASEE Virtual Annual Conference Content Access Proceedings, Sep 8, 2020
His research interests include computer science education, programming languages, parallel and di... more His research interests include computer science education, programming languages, parallel and distributed systems, and autonomic systems. He holds a Ph.D. in Computer Science from the University of Adelaide, Australia.

IGI Global eBooks, Jan 18, 2011
Latency-sensitive and data-intensive applications, such as IoT or mobile services, are leveraged ... more Latency-sensitive and data-intensive applications, such as IoT or mobile services, are leveraged by Edge computing, which extends the cloud ecosystem with distributed computational resources in proximity to data providers and consumers. This brings significant benefits in terms of lower latency and higher bandwidth. However, by definition, edge computing has limited resources with respect to cloud counterparts; thus, there exists a trade-off between proximity to users and resource utilization. Moreover, service availability is a significant concern at the edge of the network, where extensive support systems as in cloud data centers are not usually present. To overcome these limitations, we propose a scorebased edge service scheduling algorithm that evaluates network, compute, and reliability capabilities of edge nodes. The algorithm outputs the maximum All authors have contributed equally and are listed alphabetically.
His current research interests span large-scale data management, distributed systems, and privacy... more His current research interests span large-scale data management, distributed systems, and privacy/security, especially related issues in cloud data management and mobile computing, and applied to a variety of domains including healthcare, finance, and other critical infrastructure sectors. Dr. Raj also works in computer science and cybersecurity education including curriculum design and program assessment. Prior to RIT, he worked at a financial services firm, where he developed and managed leading-edge global private cloud infrastructures for a variety of financial applications. He earned his Ph.D. at the

The Computing Accreditation Commission of ABET accredits over 300 Computer Science programs world... more The Computing Accreditation Commission of ABET accredits over 300 Computer Science programs worldwide under the Computer Science program criteria. In the past few years, the Commission has engaged the computing community to modify and update these criteria, and has now signed off on an updated set of program criteria that take into account factors such as the CS2013 curricular guidelines, impact on currently accredited programs, structural changes to clarify the criteria, and the reduction of the assessment burden. These recent changes to the Computer Science program criteria primarily impact student outcomes (what program graduates are expected to know and be able to do by graduation) and curriculum. Those changes will impact computer science programs in a variety of ways and degrees---some programs will be impacted significantly while others will be affected in a relatively minor way. This paper examines the changes that will take effect starting in the 2019-20 accreditation cycle, covering the rationale for those changes and exploring the likely impact on computer science programs that are currently accredited or seeking accreditation in the near future.

These proceedings contain the papers accepted for presentation at the Twenty-Fourth Australasian ... more These proceedings contain the papers accepted for presentation at the Twenty-Fourth Australasian Computer Science Conference (ACSC 2001), hosted by Bond University and Griftith University.Fifty-four papers were submitted to the conference after a global Call For Papers was issued in April 2000. Each complete paper was fully reviewed by at least three referees from an international program committee. A total of 29 papers were accepted for presentation. The distribution of papers is as follows (based on first author):Australian state - Number of papersAustralian Capital Territory - 1 New South Wales - 8 Queensland - 11 South Australia - 9 Victoria - 10 Western Australia - 4 Other country - Number of papersAustria - 1 Fiji - 1 Korea - 1 New Zealand - 2 Singapore - 2 United Kingdom - 1 United States of America - 3 TOTAL - 54Each year the Australian Computer Science Association awards the Distinguished Australian Ph.D. Dissertation in Computer Science for the best Ph.D. thesis completed in the previous year. The award for the best Ph.D. thesis completed in 1999 went to Dr. Michael Kolling from the University of Sydney for his thesis entitled "The design of an object-oriented environment and language for teaching". In 1996, the Association began presenting awards for the best student paper at ACSC. The student had to be the major author of the paper to be eligible. The prize for best student paper in 2001 is awarded to Mike Liddell from the University of Melbourne for the paper "'Length- Restricted Coding Based on Modified Probability Distributions", co-authored with his supervisor Assoc. Prof. Alistair Moffat.. This award, and the award for the best Australian Ph.D. dissertation in 2000, will be presented at the conference.

These proceedings contain the papers accepted for presentation at the Twenty-Fifth Australasian C... more These proceedings contain the papers accepted for presentation at the Twenty-Fifth Australasian Computer Science Conference (ACSC 2002), hosted by Monash University.Seventy-seven papers were submitted to the conference after a global Call For Papers was issued in April 2001. Each complete paper was fully reviewed by at least three referees from an international program committee. A total of 37 papers were accepted for presentation. Authors came from 12 countries: Argentina, Australia, Brazil, Canada, China, Finland, Germany, Japan, Korea, New Zealand, United Kingdom, United States of America.Each year the Australian Computer Science Association awards the Distinguished Australian Ph.D. Dissertation in Computer Science for the best Ph.D. thesis completed in the previous year. The award for the best Ph.D. thesis completed in 2000 went to Dr. Johanna Wenny Rahayu for his thesis entitled Object-Relational Transformation Methodology completed at the La Trobe University under the guidance of Dr. Elizabeth Chang, and Prof. Tharam Dillon.In 1996, the Association began presenting awards for the best student paper at ACSC. In 2002 this was extended to cover the best student paper submitted across all of the conferences comprising the Australasian Computer Science Week. The student had to be the major author of the paper to be eligible. The prize for best student paper in 2002 is awarded to Trent W. Lewis from the Flinders University of South Australia for the paper Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks, co-authored with his supervisor Assoc. Prof. David M.W. Powers. This award, and the award for the best Australian Ph.D. dissertation in 2001, will be presented at the conference.

HAL (Le Centre pour la Communication Scientifique Directe), Jul 9, 2016
International audienceIn many countries serious effort has been put into developing and running p... more International audienceIn many countries serious effort has been put into developing and running programs that encourage girls to enjoy learning programming. At school level, many girls have done very well in these experiences, but despite their confidence and enthusiasm for programming at the time of the intervention, few have continued on to enroll in tertiary computing programs. In higher education institutions, numerous equity initiatives have attempted to improve both recruitment and retention, yet the pipeline continues to shrink. The running of interventions takes effort on the part of the academics to develop and much time, often in vacation periods, to deliver. As the success of these programs frequently relies on the goodwill of faculty, the authors formed an international multi-disciplinary working group to explore faculty attitudes and perceptions of these gender equity programs, and identify key features of enduring programs. In this paper, we gather and critically review existing literature resources with the aim of developing evaluation guidelines for the running of intervention programs from primary school to university education in order to encourage girls of all ages to seriously consider the prospect of undertaking a computing degree and to better support them during this time. Additionally, we explore the perceptions of faculty towards gender equity and gender equity programs, and discuss how faculty perceptions align with research findings. Our findings identify a clear need for gender equity programs, more consistent evaluation of the effectiveness of such programs including gathering, analysing and storing longitudinal data and more widespread dissemination of gender equity information to faculty

Proceedings of the 2016 ITiCSE Working Group Reports, 2016
In many countries serious effort has been put into developing and running programs that encourage... more In many countries serious effort has been put into developing and running programs that encourage girls to enjoy learning programming. At school level, many girls have done very well in these experiences, but despite their confidence and enthusiasm for programming at the time of the intervention, few have continued on to enroll in tertiary computing programs. In higher education institutions, numerous equity initiatives have attempted to improve both recruitment and retention, yet the pipeline continues to shrink. The running of interventions takes effort on the part of the academics to develop and much time, often in vacation periods, to deliver. As the success of these programs frequently relies on the goodwill of faculty, the authors formed an international multi-disciplinary working group to explore faculty attitudes and perceptions of these gender equity programs, and identify key features of enduring programs. In this paper, we gather and critically review existing literature resources with the aim of developing evaluation guidelines for the running of intervention programs from primary school to university education in order to encourage girls of all ages to seriously consider the prospect of undertaking a computing degree and to better support them during this time. Additionally, we explore the perceptions of faculty towards gender equity and gender equity programs, and discuss how faculty perceptions align with research findings. Our findings identify a clear need for gender equity programs, more consistent evaluation of the effectiveness of such programs including gathering, analysing and storing longitudinal data and more widespread dissemination of gender equity information to faculty.

Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 2
Competency-based learning has been a successful pedagogical approach for centuries, but only rece... more Competency-based learning has been a successful pedagogical approach for centuries, but only recently has it gained traction within computing education. Building on recent developments in the field, this working group will explore competency-based learning from practical considerations and show how it benefits computing. In particular, the group will identify existing computing competencies and provide a pathway to generate competencies usable in the field. The working group will also investigate appropriate assessment approaches, provide guidelines for evaluating student attainment, and show how accrediting agencies can use these techniques to assess the level of competence reflected in their standards and criteria. Recommendations from the working group report are intended to help practical computing education writ large.

Proceedings of the 2015 ITiCSE on Working Group Reports, 2015
Context: Global Software Engineering (GSE) has become the predominant form of software developmen... more Context: Global Software Engineering (GSE) has become the predominant form of software development for global companies and has given rise to a demand for students trained in GSE. In response, universities are developing courses and curricula around GSE and researchers have begun to disseminate studies of these new approaches. Problem: GSE differs from most other computer science fields, however, in that practice is inseparable from theory. As a result, educators looking to create GSE courses face a daunting task: integrating global practice into the local classroom. Aim: This study aims to ameliorate the very difficult task of teaching GSE by delineating the challenges and providing some recommendations for overcoming them. To meet our aims we pose two research questions ("When teaching GSE to students in Higher Education, what are the (a) challenges, and (b) recommendations for addressing them") and then conduct a systematic literature review (SLR) to determine the answers to these questions. Our SLR follows a carefully designed and validated protocol. Results: We found 82 papers that addressed our research questions. Our findings indicate that in addition to the challenges posed by GSE in general, particular problems arise in educational situations. The majority of these challenges fall into the "global distance" category, though teamwork challenges and people issues (such as trust) also commonly arise. Organizational differences between institutions, differing skill sets between students in different locations, and varying cultural work norms, for example, all operate within educational settings in quite different ways than in professional development teams. Integrating cultural training, conducting teamwork exercises to build trust, and instructor monitoring of team communication are all examples of techniques that have been used successfully by educators according to our review Conclusion: Despite the severity of the challenges in GSE education, many institutions have successfully developed courses and curricula targeting GSE. Indeed, for each of the challenges we have identified in the literature there are numerous recommendations for overcoming them. Instructors can use the recommendations given in this study as a starting point to running successful GSE courses.
New Trends in Software Methodologies, Tools and Techniques, 2006
Autonomic computing is a grand challenge in computing. It aims to produce distributed software th... more Autonomic computing is a grand challenge in computing. It aims to produce distributed software that has the properties of self-healing, self- organizing, self-protecting and self-optimizing. This paper focuses on the chal- lenge of injecting only self-healing properties into existing programs that targets the Java Virtual Machine. The byte code is analyzed and additional code is in- jected to automatically recover from failure such as network or processor failure. A framework to provide autonomic computing support is presented and evaluated to determine its suitability for a fully fledged autonomic computing system.
Uploads
Papers by Michael J Oudshoorn