skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Lim, Rachel"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Undergraduate teaching assistants (tutors) are commonly employed in computing courses to help students with programming assignments. Prior research in computing education has reported the benefits of tutoring both for students and for the tutors' own learning. In contrast, recent research that examined actual tutoring sessions has reported that these sessions may be less productive than one might hope, with tutors often just giving students the answers to their problems without trying to teach the underlying concepts. To better understand why tutors may be employing these suboptimal practices, we interviewed ten tutors across early computing courses in higher education to identify their perceived role in these sessions, what stressors and factors influence their ability to perform their job effectively, and what kinds of best practices they learned in their tutor training course. Tutors reported their roles around student learning, gauging student understanding, identifying or providing solutions to students, and providing socioemotional support. They reported their stressors around environmental factors (e.g., number of students waiting to be helped, preparation time, peer-tutor frustrations), internal influences, student behavior, student skill levels, and feeling the need to ''read a student's mind.'' Regarding their tutor training course, Tutors reported learning about interaction guidelines and procedures and question-based problem solving. We conclude by discussing how these results may contribute to the less-effective behaviors seen in prior research and potential ways to improve tutoring in computing courses. 
    more » « less
    Free, publicly-accessible full text available February 12, 2026
  2. Many institutions use undergraduate teaching assistants (tutors) in their computing courses to help provide more resources to students. Because of the role tutors play in students' learning experiences, recent work in computing education has begun to explore student-tutor interactions through the tutor's perspective and through direct observation of the interactions. The results suggest that these interactions are cognitively challenging for tutors and may not be as beneficial for students' learning as one might hope. Given that many of these interactions may be unproductive, this work seeks to understand how student expectations of these sessions might be impacting the interactions' effectiveness. We interviewed 15 students in a CS2 course to learn about the expectations and desires that students have when they attend tutoring sessions. Our findings indicate that there is variation in what students consider a desired result from the interaction, that assignment deadlines affect students' expectations and desires for interactions, and that students do not always want what they believe is beneficial for their learning. We discuss implications for instructors and potential guidance for students and tutors to make tutoring sessions more effective. 
    more » « less
  3. Recent research in computing has shown that student performance on prerequisite course content varies widely, even when students continue to progress further through the computing curriculum. Our work investigates instructors' perspectives on the purpose of prerequisite courses and whether that purpose is being fulfilled. In order to identify the range of instructor views, we interviewed twenty-one computer science instructors, at two institutions, that teach a variety of courses in their respective departments. We conducted a phenomenographic analysis on the interview transcripts, which revealed a wide variety of views on prerequisite courses. The responses shed light on various issues with prerequisite course knowledge, as well as issues around responsibility and conflicting pressures on instructors. These issues arise at the department level, as well as with individual course offerings. 
    more » « less
  4. As enrollments in computing courses have surged, the ratio of students to faculty has risen at many institutions. Along with many other large undergraduate programs, our institution has adapted to this challenge by hiring increasing numbers of undergraduate tutors to help students. In early computing courses, their role at our institution is primarily to help students with their programming assignments. Despite our institution offering a training course for tutors, we are concerned about the quality and nature of these student-tutor interactions. As instruction moved online due to COVID-19, this provided the unique opportunity to record all student-tutor interactions (among consenting participants) for research. In order to gain an understanding of the behaviors common in these interactions, we conducted an initial qualitative analysis using open coding followed by a quantitative analysis on those codes. Overall, we found that students are not generally receiving the instruction we might hope or expect from these sessions. Notably, tutors often simply give students the solution to the problem in their code without teaching them about the process of finding and correcting their own errors. These findings highlight the importance of tutoring sessions for learning in introductory courses and motivate remediation to make these sessions more productive. 
    more » « less
  5. Localized residual stress and elastic strain concentrations in microelectronic devices often affect the electronic performance, resistance to thermomechanical damage, and, likely, radiation tolerance. A primary challenge for the characterization of these concentrations is that they exist over sub-μm length-scales, precluding their characterization by more traditional residual stress measurement techniques. Here, we demonstrate the use of synchrotron x-ray-based differential aperture x-ray microscopy (DAXM) as a viable, non-destructive means to characterize these stress and strain concentrations in a depth-resolved manner. DAXM is used to map two-dimensional strain fields between the source and the drain in a gallium nitride (GaN) layer within high electron mobility transistors (HEMTs) with sub-μm spatial resolution. Strain fields at various positions in both pristine and irradiated HEMT specimens are presented in addition to a preliminary stress analysis to estimate the distribution of various stress components within the GaN layer. γ-irradiation is found to significantly reduce the lattice plane spacing in the GaN along the sample normal direction, which is attributed to radiation damage in transistor components bonded to the GaN during irradiation. 
    more » « less
  6. null (Ed.)
    Mobile manipulators, constructed by mobile platforms and manipulators, have become a promising solution to future factories for introducing flexibility to manufacturing. This paper presents a method, hierarchical receding horizon control algorithm (HRHC), to assure safety and achieve higher time and space efficiency in robots surrounded by time-varying environments. HRHC contains an optimization based motion planning module that takes account of both the mobile platform and the manipulator to utilize the kinematic redundancy, and a low-level safety controller to deal with fast changes in the environment. With this method, we verify the performance through experiments. The result shows that space efficiency is increased and the HRHC can guarantee local safety in dynamic environments. 
    more » « less
  7. Deep neural networks are revolutionizing the way complex systems are designed. Consequently, there is a pressing need for tools and techniques for network analysis and certification. To help in addressing that need, we present Marabou, a framework for verifying deep neural networks. Marabou is an SMT-based tool that can answer queries about a network’s properties by transforming these queries into constraint satisfaction problems. It can accommodate networks with different activation functions and topologies, and it performs high-level reasoning on the network that can curtail the search space and improve performance. It also supports parallel execution to further enhance scalability. Marabou accepts multiple input formats, including protocol buffer files generated by the popular TensorFlow framework for neural networks. We describe the system architecture and main components, evaluate the technique and discuss ongoing work. 
    more » « less