Dual referencing has been garnering a lot of attention in the power integrity community, specifically in the voltage mode driver application because it shows a lower overall power delivery noise (PDN) compared to other signal referencing types. Additionally, the increasing push to drive down package and board manufacturing costs is...
A duty-cycle controlled switched resistor is a tunable resistive element that uses pulse width modulation as the method of tuning. This thesis will describe the operation of switched resistors and propose several circuit architectures that are well suited to the use of switched resistors. These architectures include filters, mixers, and...
The increased demand for building materials that are friendly to the environment, along with the latest advances in wood science and technology, which exploit the fiber orientation of wood, resulted in composite wood materials known as mass-timber products. To understand the effects the wood fiber orientation has on the dynamic...
Traditional approaches to streaming H.264 video over a network typically rely on a single method of transport (i.e., reliable or unreliable) and/or use static values for parameters that can have a significant negative impact on the perceptual quality of the received video. This dissertation presents a dynamic method for wireless...
New amplifier architectures are presented using non-traditional methods of biasing. Time-based dynamic biasing and signal-based dynamic biasing are discussed in the context of new architectures. This includes a new form of ring amplification with a dynamic deadzone, allowing for a structure whose coarse path does not consume static power.
Load modeling that can accurately represent the dynamic behavior of generators and loads is important in the operation and planning of transmission and distribution systems. Yet, it is a complex subject in power system research communities and electric utilities. The composition of the end-use loads is changing continually based on...
Continuous-time ΔΣ modulators are widely used in cellular handsets due to their power efficiency and inherent anti-aliasing characteristics. To achieve demanding cellular bandwidth requirements while maintaining good power efficiency, multi-bit feedback is typically used. This approach provides benefits such as lower OSR, relaxed loop filter requirements, and reduced jitter sensitivity....
Several frequency and amplitude estimation algorithms are presented for balanced and unbalanced three-phase power grid systems. All the estimators are dynamic in nature and are implemented in the complex domain by transforming the three-phase power signals using Clarke’s transform. Specifically, we first construct a non-linear dynamic model of the complex...
Dynamic modeling is key to the successful operation and reliability of electrical grids by evaluating transient stability. Developing dynamic load models and identifying where they are necessary is a challenging task as loads are an aggregation of individual devices that change throughout the year. This thesis investigates how to develop...
Wireless High Definition Video Transmission (WHDVT) over 802.11-based networks enjoys widespread deployment among today's multimedia solutions. Examples include Intel® Wireless Display and Apple Airplay®, to name a few. In these systems, peer-to-peer networks are established over which H.264-encoded video is transported wirelessly to be decoded and played back at the...
Recent blackout events consistently show that a variety of mechanisms are involved in cascading outages. These cascading mechanisms are irregularly modeled and validated within the existing literature and industry practices. Understanding the relative significance of these different mechanisms is important for choosing which one(s) needs to be modeled for specific...
End-user programming is growing at a rapid rate, but there has been little in the way of tools or environments to improve the correctness of programs created by end users. We present an approach to dynamic assertions in one of the most widely used end-user programming paradigms - namely the...
Building intelligent computer assistants has been a long-cherished goal of AI. Many intelligent assistant systems were built and fine-tuned to specific application domains. In this work, we develop a general model of assistance that combines three powerful ideas: decision theory, hierarchical task models and probabilistic relational languages. We use the...
This study presents the results of using common two or three-parameter "default" distributions in place of "best fit distributions" in simulations of serial production lines with finite buffers and blocking. The default distributions used instead of the best-fit distribution are chosen such that they are non-negative, unbounded, and can match...
This thesis presents the results of two studies that investigate the question of what interruption-styles are most appropriate for end-user programmers who are debugging programs. In the studies, end-user programmers are presented with surprises that encourage them to investigate, use, and learn about debugging devices in their programming environment. We...
ZnO nanowires (NWs) are good candidates for chemical sensing because of their high surface-to-volume ratio. In this work, ZnO nanobridge sensors were fabricated utilizing a novel method which uses carbonized photoresist (C-PR) as a nucleation layer. The use of C-PR allows simultaneous growth and integration of NWs to lithographically-defined features....
Many large-scale data analysis applications involve data that can vary over both time and space. Often the primary goal of analyzing spatiotemporal data is identifying trends, movements, and sudden changes with respect to time, location, or both. This can include a variety of applications in economics (housing prices, unemployment, job...
Due to the continued evolution of 5G standards, the need for higher rates of data, lower latency network access, and implementations that are more energy efficient have become clear. To enable wireless communications at rates over tens of Gbps, the wide bandwidth of mmWave spectrum can be exploited. Beamforming (or...
RNAs play important roles in multiple cellular processes, and many of their functions rely on folding to specific structures. To maintain their functions, secondary structures of RNA homologs are conserved across evolution. These conserved structures provide critical targets for diagnostics and therapeutics. Thus, there is a need for developing fast...
Popular applications such as P2P file sharing, multiplayer gaming, videoconferencing, etc. rely on the efficiency of content distribution from a single source to multiple receivers. Most users of these applications are on the widely prevalent source constraint networks such as the Digital Subscriber Line (DSL) and wireless networks. Overlay multicast...
Error correction codes (ECCs) have been widely used in communication systems and storage devices. Nowadays, the rapid development of integrated circuit technologies makes feasible the implementation of powerful ECCs such as turbo code and low-density parity-check (LDPC) code. However, these high-performance codes require complex decoding algorithms, resulting in large hardware...
Deep Learning methods have been gaining a lot of significance for various Biomedical applications for diagnosing several types of diseases. Two applications considered here are: 1) Diabetic Retinopathy Detection and 2) ECG signal Classification (or Arrhythmia Detection). Diabetic Retinopathy (DR) is a major cause of blindness in Diabetic patients, and...
Multiple-input multiple-output (MIMO) antennas can be exploited to provide high data rate using a limited bandwidth through multiplexing gain. MIMO combined with orthogonal frequency division multiplexing (OFDM) could potentially provide high data rate and high spectral efficiency in frequency-selective fading channels. MIMO-OFDM technology has been widely employed in modern communication...
Constructing a panorama from a set of videos is a long-standing problem in computer vision. A panorama represents an enhanced still-image representation of an entire scene captured in a set of videos, where each video shows only a part of the scene. Importantly, a panorama shows only the scene background,...
In this thesis, novel solutions are proposed for key management issues in mobile ad hoc networks. Presented Hierarchical Binary Tree (HBT) based model is distributed, self-organizing, scalable and does not employ online key distribution authority or group manager. Two different group authentication and group key establishment protocols are proposed for...
Relay-assisted cooperative communications are promising solutions for error-performance improvement and cell coverage extension. In this thesis, we propose several efficient cooperative relay communication schemes. First, an efficient space-time coded cooperative relay communications scheme that employs linear precoding and transmission-pattern selection is proposed. This is built upon an existing block linear...
The outsourcing of data storage and related infrastructure to third-party services in the cloud is a trend that has gained considerable momentum in the last decade due to the savings it affords companies in both capital and operational costs. Although encryption can alleviate some of the privacy concerns associated with...
Harvesting energy from the environment for powering micro-power devices have been increasing in popularity. These types of devices can be used in embedded applications or in sensor networks where battery replacement is impractical. In this dissertation, different methods of energy harvesting from the environment are explored as alternative sources of...
Private matching (PM) is a key cryptographic primitive in secure computation that allows several parties to jointly compute some functions depending on their private inputs. Indeed, this primitive has many practical applications. For instance, in online advertising, two companies may wish to find their common customers for a joint marketing...
Internet of Things (IoT) is an integral part of application domains such as smart-home, digital healthcare, smart grid systems and vehicular networks. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, digital signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and...
As the demand for real-time information in engineering and health care systems keeps increasing, the need for wireless sensor nodes is also continuously increasing. As a result, the cost and effort involved in installing and maintaining batteries to power the numerous sensor nodes is growing exponentially. Providing a cost effective...
Besides enabling an enhanced mobile broadband access, fifth-generation (5G) wireless mobile networks are envisioned to support the connectivity of massive, heterogeneous Internet of Things (IoT) devices. Connecting these devices through 5G systems and providing them with their needed data rates require huge amounts of spectrum and power resources, thus calling...
Sequential supervised learning problems arise in many real applications. This dissertation focuses on two important research directions in sequential supervised learning: efficient training and feature induction.
In the direction of efficient training, we study the training of conditional random fields (CRFs), which provide a flexible and powerful model for sequential...
Time-domain data conversion has recently drawn increased research attention for its highly digital nature in favor of process technology scaling. Also, as the time information being carried by binary voltage, time-domain operation is much less sensitive to voltage noise compared to conventional voltage domain operation. However, for analog-to-digital converter (ADC)...
Multiple-input multiple-output (MIMO) communication systems have recently been considered as one of the most significant technology breakthroughs for modern wireless communications, due to the higher spectral efficiency and improved link reliability. The sphere decoding algorithm (SDA) has been widely used for maximum likelihood (ML) detection in MIMO systems. It is...
The communication in MLS cross-domain environments faces many challenges. The three most important challenges are efficient key management, privacy preserving and covert channel. We propose an Efficient, Secure and Covert Channel Capacity Bounded Protocol which has three algorithms that addresses these challenges: The Efficient Attribute-based Fine-Grained Authentication (EAFA) algorithm, Anonymous...
Disaster response robots need to be simultaneously able to survive extreme environment and complete the mission efficiently and robustly. One of the determinants is the performance of the actuators in each joint, which drive the robot to the desired motion accurately. In robotics society, people usually build their robots directly...
This thesis describes the transport properties observed in thermally treated graphite oxide (GO), which holds promise as an economical route to obtaining graphene. Graphene is a material consisting of a single atomic plane of carbon atoms and was first isolated as recently as 2004. Several isolation techniques have been investigated,...
With increasing transistor operating frequencies, interconnects and passive devices are becoming performance limiters in integrated circuit (IC) designs. To combat this, the interconnect layers above the active silicon are trending toward low-κ dielectrics and Cu metallization. The use of these new materials has popularized chemical mechanical polishing (CMP) to planarize...
The objective of this research is to demonstrate the feasibility of implementing electrically tunable on-chip inductors based on synthetic antiferromagnet (SAF) cores. This thin film magnetic core is made of a magnetic bi-layer antiferromagnetically coupled through a nonmagnetic spacer layer. An energy model is developed to investigate the magnetic behavior...
Many new applications of energy system devices have been developed to save energy, improve the controllability and stability of industrial processes, and reduce the weight, volume and cost of consumer devices. Due to the novelty of these devices, traditional empirical methods and lumped-parameter circuit theory methods are not sufficient for...
The research presented herein focuses on electrical assessment of oxide thin films as insulators. The current density-electric field (J-E) characteristics of four insulators of dramatically different electrical quality are assessed in terms of their operative electronic conduction mechanisms. Conduction in the two high-quality insulators is dominated by Ohmic conduction and...
The objective of this dissertation is to develop amorphous metal thin films (AMTFs) for two-terminal electrical device and nanolaminate applications. Two AMTFs, ZrCuAlNi and TiAl, are investigated in both two-terminal electrical device and nanolaminate applications. Material properties including composition, atomic order, surface morphology, surface potential, and electrical resistivity are explored....
Despite near unanimous opinion on the consequences of climate change by scientific community, the rate at which carbon is emitted into the atmosphere continues to increase. The need for a clean and sustainable source of energy is therefore one of humankind's most urgent challenges. Solar energy is the most abundant...
Professional software engineers have an arsenal of techniques such as unit testing and assertions to check their specifications, but these techniques require tools, motivation, experience and training that programmers without professional software engineering training may not have. As a result, professionals in other fields, such as scientific modelers, face greater...
Programming is integrated across the workflow of multiple domains where end-user programmers, those who need to program as a means to an end, regularly need to code. In the modern setting of collaborative development, end-user programmers have to interpret the intentions behind existing code to contribute and build solutions to...
The stupendous growth in wireless and mobile devices in the recent years has prompted researchers to look at innovative approaches that enable effective use of the available resources. In this thesis, we propose a medium access control (MAC) protocol, referred to as EM-MAC, that enables wireless devices with multi-channel access...
Researchers/engineers in the field of software testing have valued coverage as a testing metric for decades now. There have been various empirical results that have shown that as coverage increases the ability of the test program to detect a fault also increases. As a result numerous coverage techniques have been...
Many home users nowadays use various smart devices to improve the efficiency and convenience of their home environments. Trigger-action platforms such as “If-This-Then-That” (IFTTT) enable end users to connect different smart devices and services using simple apps to control these devices and automate the tasks (e.g., if the camera detects...
In today’s world, we are highly dependent on software systems together with devices for almost every task in our day to day life. Software system upgrades are released whenever it is necessary to accommodate the ever-changing user’s needs. The devices we use to run the software systems might be of...
In advanced integrated circuit (IC) processes, the metal fill inserted to meet foundry imposed density requirements degrades the performance of interconnects and passive components which ultimately affects the overall circuit performance. Accounting for this degradation through electromagnetic and equivalent circuit modeling is becoming a critical aspect of IC design. However,...
Geographical datasets are large, complex, and can be difficult for users to navigate and derive meaning from. These datasets, as well as the unique insights derived from them, provide tremendous opportunity for social change -- many of the global challenges humankind is currently facing can benefit from analytics or visualization...
Current methods for visualizing forest rely on geospatial and remote sensed data. Such data can be used to create visualization and to perform simulations. Currently, however, these visualizations are often limited to 2D or abstract representations. These methods can be effective for large scale data visualization and low accuracy needs....
Previous research has revealed gender differences that impact females’ willingness to adopt software features in end users’ programming environments. Since these features have separately been shown to help end users problem solve, it is important to female end users’ productivity that we find ways to make these features more acceptable...
Physical-Layer Network Coding (PNC) is a promising technique that has great potentials for improving the achievable data rates of end-to-end flows through higher packet transmission rates, thereby increasing the overall network throughput. In this thesis, we study the performance of the PNC transmission techniques for unidirectional end-to-end flows in multi-hop...
Surveys are often used in health studies to collect data about participants for scientific research. An increasing number of health scientists are turning to online data collection methods because they are less costly and can reach a large diverse population quickly. Online surveys also make it easy to track and...
Online survey data collection is becoming popular because it provides benefits in cost, ease of collecting and managing data, flexibility in format, and access to a diverse population. Surveys are often used for health studies such as Oregon State University’s WAVE Project, which utilizes the WavePipe system, a server enabling...
Spreadsheets are among the most widely used end-user programming systems. Unfortunately, there is a high incidence of errors in end-user spreadsheets, and some of these errors have high impact. In this dissertation, we describe techniques we have developed to help end users develop safer spreadsheets. As part of our research,...
Data converters are ubiquitous building blocks of a signal chain. The rapid increase in
communication and connectivity devices presents new avenues for pushing the state of
the art analog to digital converters. Techniques for improving resolution, bandwidth,
linearity and bit-error rate, while reducing the power, energy and area is the...
For the past half century, CMOS process scaling has followed Moore's law, approximately doubling transistor density every 18 months. While locally routed wires have generally scaled with transistor size, longer wires have scaled at a slower rate and in some cases have grown larger as chip size and complexity have...
Harvesting energy from ambient sources can provide power autonomy to energy efficient electronics and sensors. The last decade has seen a multitude of ways to scavenge energy from various sources like solar, thermal, electromagnetic, electrostatic, piezo-electric and many more. Thermal energy from human body heat is ubiquitous and can be...
The current state of research on gossip techniques for wireless broadcasting is very limited because past research efforts have mostly focused on using gossip techniques for multicast communication. On the other hand, those research efforts that have focused on using gossip techniques for wireless broadcast communications ignore energy efficiency and...
The design of high-performance, high-speed clock generation and distribution becomes challenging in terms of phase noise, jitter and power consumption, due to the fast development of communication and computing systems. Injection locking is a promising clocking technique since it can significantly improve the energy efficiency, suppress the phase noise of...
The CMOS two-stage Operational Transconductance Amplifier (OTA) has been a key enabler for mixed-signal IC design for nearly four decades . This research focuses on a modified two-stage CMOS OTA that features load-pole cancellation (LPC); i.e., the resulting architecture is essentially a two-stage CMOS OTA with no load capacitance. The...
Energy consumption has become a great deal for cloud service providers due to financial as well as environmental concerns. Studies show that cloud servers operate, most of the time, at only between 10% and 50% of their maximal utilizations. These same studies also show that servers that are kept ON...
Linear wireless sensor networks (LWSN) are special class of wireless sensor networks where sensor nodes are deployed in a straight line. Monitoring industrial pipelines, railroads, tunnels, power lines, and borders are applications of LWSNs. Wireless sensors are tiny devices with limited energy resources; therefore, efficient energy routing in LWSNs is...
Short-range wireless communications continually attract interest from both industry and academia, and it is changing our life in every aspect in the last decade. The design of wireless transceivers is the bottleneck for variety applications, due to RF modeling inaccuracy, stringent FCC regulations over the transmitted power spectrum, interference, multi-path...
We present student perceptions of a new first-year engineering programming class that was designed by informed research practices. While the College of Engineering at Oregon State University saw a lot of major switching in the first year, there were not many students switching into computer science (CS). This could have...
This research focused on the use of classical and modern two-dimensional spectral estimation techniques for enhancing inverse synthetic aperture radar (ISAR) imagery. 2-D Classical spectral estimation methods and 2-D modern parametric and non-parametric spectral estimation methods are applied to simulated and real data sets in order to achieve both range...
Digital-to-analog converters (DACs) suffer from static and dynamic nonlinearity problems, which degrade their accuracy and performance. Mismatch errors in the analog components restrict the maximum achievable linearity.
This thesis presents various techniques for correcting these errors. It describes a correction process for the nonlinear behavior of DACs, on three different...
The AE32000 processor core, developed by Advanced Digital Chips Inc., Korea, is used primarily in the embedded processing environment. The AE32000 simulator models this embedded processor core having high code density. An enhanced simulator was developed to study the performance of the present Instruction Set Architecture after comparison with the...
In the current education environment, many instructors make use of some type of software, such as Visual Studio or a software library like OpenGL, in the classroom. Incorrect setup and configuration on an individual’s own system is a common problem when using these software tools. This thesis explores the difficulty...
Application Programming Interfaces (APIs) enable software developers to utilize and create functionality that would otherwise take a lot of time and effort to build from scratch. Consequently, an essential part of software engineering training is for students to learn how to use APIs effectively. The existing jTutors system enables an...
This thesis studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically analyze and evaluate the achievable performance of these techniques in the downlink of Rayleigh fading channels. We provide an approximation of both the bit-error rate (BER) and the...
This Thesis aims to determine whether we can improve the accuracy, resolution, and speed of calculations for common power system problems using simple computational models that scale well to machine learning and high performance computing solutions. The second chapter of this Thesis implements more precise aging and degradation models for...
Software testing is a very important task during software development and it can be used to improve the quality and reliability of the software system. One potential way to reduce the cost and increase the efficiency of software testing is to generate test data automatically. Search-based approaches successfully generate unit...
WebGen is a software tool for generating Web scripts automatically for a Web-based database application. In this project, access control, AJAX support, and editable-and-insertable table mechanisms were added to WebGen. With our access control mechanism, an access-control level can be specified for each table. In access control level 1, for...
Monte-Carlo planning algorithms such as UCT make decisions at each step by
intelligently expanding a single search tree given the available time and then
selecting the best root action. Recent work has provided evidence that it can be
advantageous to instead construct an ensemble of search trees and make a...
Radio frequency (RF) sensing arises as a promising option for enabling the internet of things (IoT) applications that transform our life into a world of smart homes, smart cities, and smart industries. The innovation of IoT reveals the benefits of RF sensing across cost, pervasiveness, unobtrusiveness, and privacy. However, challenges...
We report the first systems biology investigation of regulators controlling arterial plaque macrophage transcriptional changes in response to lipid lowering in vivo in two distinct mouse models of atherosclerosis regression. Transcriptome measurements from plaque macrophages from the Reversa mouse were integrated with measurements from an aortic transplant-based mouse model of...
The addition of thin-film alloy magnetic materials to integrated circuit processing enables a number of novel monolithic circuits. Examples include fully integrated magnetic field sensors, signal and power galvanic isolation circuits, and power supplies on chip (PwrSoC). There are several benefits to integrating these traditionally off-chip devices, including improved manufacturability,...
Object detection models are being widely used in many applications, such as autonomous driving, construction management, and cancer detection. Evaluating the performance of the object detection model is more complicated than other computer vision models such as image classification models. Most of the images have several objects to be detected,...
The asymmetric nature of bit errors in several practical applications provides grounds for efficient error control techniques. The Z-channel model and special classes of codes like asymmetric error detection codes and t-asymmetric error correcting/d-asymmetric error detecting codes can be successfully used in ARQ protocols for feedback error control enhancement. This...
This paper examines how six online multiclass text classification algorithms perform in the domain of email tagging within the TaskTracer system. TaskTracer is a project-oriented user interface for the desktop knowledge worker. TaskTracer attempts to tag all documents, web pages, and email messages with the projects to which they are...
Social media platforms use many techniques to engage users' attention with their platforms, including notifications, popups, and gamification elements. The impact of social media on physical and mental health has been studied, but limited publicly available research exists on how social media users can be helped to disengage from these...
The Gulf of Alaska (GOA) is home to the most productive fisheries in the world. In 2019, 2.2 million metric tons of fish were shipped from Alaska to destinations all over the world (NOAA Fisheries, 2019). From 2014-2016 and, more recently, in 2019 the largest heatwaves in recorded history caused...
Collaboration is tricky, but often beneficial in the context of numerous software related activities, from learning core concepts, to the design and implementation of large software products. The growth of online classes, from small structured seminars to massive open online courses (MOOCs), and the isolation and impoverished learning experience some...
The Pacific Northwest is part of the "Ring of Fire," which is well-known for heavy seismic activity. Numerous active faults in the area have encouraged electric grid managers in the region to more deeply contemplate and proactively intervene to support grid resilience. This research introduces Monte Carlo (MC) based power...
Software engineers often need help with discovering and learning how to use APIs. For example, software engineers who are starting to learn Java, and they want to implement a certain feature in a program, they might want to reuse existing APIs in order to save time versus rewriting it themselves...
Monte-Carlo Tree Search (MCTS) is an online-planning algorithm for decision-theoretic planning in domains with stochastic and combinatorial structure. The general applicability of MCTS makes it an ideal first choice to investigate when developing planners for complex applications requiring automated control and planning. The first contribution of this thesis is to...
Advancements in power electronics to higher power levels and faster switching times allow new machine and systems designs, but also create higher stresses on electric machinery insulation. High performance, pulse-width modulated (PWM) inverters are now available for medium voltage drive systems, and are being considered by the U.S. Navy as...
The evaluation of the stray-load losses in induction motors is an important part of the efficiency estimation process. However, stray-load losses have several components which are difficult to isolate and calculate. Consequently, they are more readily determined by test. IEEE Standard 112-1996 recommends the testing of electrical induction motors at...
Time of Arrival (TOA) is a popular technique used for geolocation. This thesis evaluates the use of TOA techniques indoors. The accuracy of measuring distances using TOA is dependent on the bandwidth of the system and the multipath conditions between the receiver and transmitter. System bandwidth has a significant effect...
Automatic event extraction from natural text is an important and challenging task for natural language understanding. Traditional event detection methods heavily rely on manually engineered rich features. Recent deep learning approaches alleviate this problem by automatic feature engineering. But such efforts, like tradition methods, have so far only focused on...
Advances in low-power digital integration and microelectro-mechanical systems (MEMS) have paved the way for micro-sensors. These sensors are equipped with data processing capabilities along with sensory circuits. Sensor data are processed on these individual sensors and transmitted to the target (sink). Lowcost integration and small sizes of these sensors have...
Full dynamic control of physically simulated characters is the holy grail of video
games and other interactive applications. Recent advances in the field have
presented controllers that can handle the balance and fall response after a
collision. This thesis addresses the development of a controller that handles the
response before...
An interdisciplinary study into the theory of design decisions has yielded a model for tracking design changes in hardware/software systems, but it still needs to be applied to a larger system to test its efficiency at tracking important data. This thesis creates an implementation of PLEXIL, a language in development...
Hydropower is the one of the oldest renewable energy technologies and is wrongly thought of today as having little room to grow. The opportunity for new hydropower capacity is immense through both technology advancement and run-of-river new stream reach projects. Despite the age of hydropower, a divide in opinion is...
Machine Translation, the task of automatically translating between human languages has been studied for decades. This task is used to be solved by count-based statistical models, e.g. Phrase-based Statistical Machine Translation (PBSMT), which solves the translation problem by separately training a statistical language model and a translation model. Recently, Neural...
There has been little research into how end-user programming environments can provide explanations that could fill a critical information gap for end-user debuggers – help with debugging strategy. To address this need, we designed and prototyped a video-based approach for explaining debugging strategy, and accompanied it with a text-only approach....