Honors Section
Wed Dec 7 2011 3:20 PM
Week 11: Honors Section #9
This week we did the following in our honors section:
-
We talked about which assignment(s) were each student's favorite from CSE 142/143.
-
142 HW2: Space Needle / ASCII Art *
-
142 HW3: Circles / Doodle **
-
142 HW5: Guessing Game *
-
142 HW7: Personality Test *
-
142 HW8: Critters *******
-
143 HW4: Assassin *
-
143 HW6: Anagrams ***
-
143 HW7: 20 Questions *
-
143 HW8: Huffman Coding **
-
ALL (liked all assignments) *
-
In keeping with our discussions about human intelligence and the brain, we talked a bit about learning and learning styles. How do you learn new concepts? Researchers have identified four "neuro-linguistic models":
- visual learners;
- auditory learners;
- reading/writing-preference learners;
- kinesthetic learners or tactile learners.
Peter Honey and Alan Mumford have a model that includes four stages of learning:
- having an experience
- reviewing the experience
- concluding from the experience
- planning the next steps
What type of learner are you; how do you learn new concepts the best? Do you think the majority of CSE 14x students, or computer scientists in general, are a certain type of learner?
-
We talked about the "Back to Basics" paper and about the philosophy behind UW's intro CSE courses. What are the benefits of teaching objects early? What about teaching objects late, as is done at UW?
-
We talked about the paper on factors contributing to success in an intro CSE course. Which factors were most highly correlated, and why? Why might some factors, such as heavy computer use, not be correlated (or be negatively correlated)?
Wed Nov 30 2011 3:20 PM
Week 10: Honors Section #8
This week we did the following in our honors section:
-
We talked about Chapter 7 from Blown to Bits. Relevant issues and questions:
-
As a teen, did you face monitoring or censorship by your parents? Did they let you watch R-rated movies? Listen to music with explicit lyrics? Did they let you have a cell phone? A car? Did you have your own computer, or use a shared family computer? Did they monitor your internet usage, and/or run a site blocker to stop you or siblings from viewing inappropriate materials online?
-
Should sites like MySpace, Facebook, etc. be totally uncensored, or should they allow any content whatsoever to be posted and transmitted? What content (if any) should be forbidden? (hate speech, defamation, profanity, pornography, child pornography, drug trafficking?)
-
What, if anything, should sites like MySpace, Facebook, Twitter, etc. do about the problem of sexual predators and other crime that may be facilitated by their services? Are they at all liable for such events if they occur? (Are they more like a distributor/truck, a newspaper/publisher, or a library?)
-
The difference between the online filtration policies employed by CompuServe (uncensored, legally safe) and Prodigy (censored, possibly legally liable).
-
The "Miller Test" for whether content is obscene.
-
Good Samaritan laws and clauses like those that have been applied to online content providers in the past. Were these good laws?
-
Have you ever used a pre-WWW communication site such as a BBS, gopher, IRC, etc.?
-
For next week, we won't read Chapter 8 from Blown to Bits because it's less conducive to a good group discussion. Instead, please read any two of the following articles of your choice (you can read all of them if you like):
-
Learning Styles and Strategies.
R. M. Felder and B. A. Soloman, North Carolina State University.
-
Contributing to success in an introductory computer science course: a study of twelve factors.
B. Wilson, Murray State; S. Shrock, Southern Illinois University. SIGCSE '01 Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education.
(original citation)
-
Perceptions of Women in CSE.
Lau, T. 2004.
-
Back to Basics in CS1 and CS2.
S. Reges, University of Washington
(A bit of context if you decide to read Stuart's back to basics paper: "CS1" is the standard generic term for a university's first computer science / programming course; similarly, "CS2" means the second course. "ACM" is the Association of Computing Machinery, the international computer scientists' organization whose members are lots of CSE teachers, students, and industry developers. "SIGCSE" is the Special Interest Group of Computer Science Educators, the ACM sub-group of all the CSE teachers. It's basically the clubhouse for CSE teachers like me who get together for conferences and talk about effective ways to teach computer science.)
Wed Nov 16 2011 3:20 PM
Week 9
We cancelled honors section this week because it is the day before Thanksgiving. We'll resume next week.
Wed Nov 16 2011 3:20 PM
Week 8: Honors Section #7
This week we did the following in our honors section:
-
We talked about Chapter 6 from Blown to Bits. Relevant issues and questions:
-
Is it wrong to illegally download music using P2P software such as BitTorrent and Kazaa?
-
The RIAA goes after illegal downloaders (sometimes falsely). Is this a deterrent? Should they do this to protect their artists?
-
The claim is that it costs $750 per song infringed in an illegal downloading case. Why is it so high? Is this a fair and reasonable amount?
-
We discussed the Sony v. Universal Studios legal case that established the legality of using a video cassette recorder to record broadcast television shows, and its relevancy today to copying and recording media content.
-
Is it right that a person should have secondary liability when their computer or internet connection is party to illegal file sharing without their knowledge?
-
Many media files now come with Digital Rights Management (DRM) restrictions placed upon them. How do you feel about DRM? Should it be used? Is it a necessary evil?
-
Does the 1998 Digital Millenium Copyright Act (DMCA) law encourage or limit innovation? What is its impact on file sharing and piracy?
-
Marty talked about his experience publishing books and fretted about the possibility of his books being illegally downloaded, such as Building Java Programs and Web Programming Step by Step (both available now online for a reasonable price!!!1).
-
We talked briefly about IBM's Watson, a computer that played on the game show Jeopardy! recently. Here are some links:
-
For next week, we are going to read Chapter 7 of Blown to Bits.
Wed Nov 9 2011 3:20 PM
Week 7: Honors Section #6
This week we did the following in our honors section:
-
We talked about Chapter 5 from Blown to Bits. Relevant issues and questions:
-
We talked about encryption, along with some classic kinds of encryption algorithms, such as Caesar ciphers, substitution ciphers, and Vigenère ciphers.
-
We talked about the RSA encryption algorithm and the idea of public-key cryptography.
-
We talked about possible ways to crack encryption algorithms and how computationally feasible it is to do so. For example, RSA is based on the assumption that factoring very large integers is hard for a computer to do quickly. (The field of quantum computing my lead to algorithms that can perform factoring much faster.)
-
We compared and contrasted encryption with steganography, a form of security through obscurity, as discussed in previous sections. What are the relative pros/cons of each?
-
Users are often the weak link in a computer security system, such as by divulging their passwords. Tricking users into giving up their passwords is called social engineering.
-
Should it be illegal to encrypt data so tightly that no one else can read it? What if the government or law enforcement needs to seize your data, but you've made it so they can't read it? Should every encryption algorithm be built with a back-door for the government or law enforcement to be able to read it if necessary?
-
Does the government, or anyone else, already have a hidden backdoor that they could use to spy or read our messages?
-
We learned a bit about how the Enigma machine works, and some history about how it was broken by the Polish and by computer science pioneer Alan Turing.
-
Marty led a discussion on the basics of artificial intelligence. Just as the human brain is a "meta-mind" that is good at simulating the state of other creatures' brains, the computer is a "meta-machine" that is good at simulating the state of other machines. But real AI is very hard; many "smart" computers such as IBM's Deep Blue and Watson are skilled only at one specific task, rather than having general knowledge and ability to adapt and learn. We talked about the Turing test, including programs such as ELIZA PARRY. We talked about the relative computing power of a human brain vs. a processor. According to research, a brain runs at up to roughly 1,680,000 MHz and storing up to 100 terabytes of data. We talked about areas of computer science related to AI, such as machine learning, computer vision, and natural language processing. How long will it be until we have human-level AI?
-
For next week, we are going to read Chapter 6 of Blown to Bits.
Wed Nov 2 2011 3:20 PM
Week 6: Honors Section #5
This week we did the following in our honors section:
-
We talked about Chapter 4 from Blown to Bits. Relevant issues and questions:
-
Marty talked about the Java feature called labeled break (more info). We saw a strange program
UrlInCode.java
with a URL in the middle of the code that still compiles and works.
-
Marty led a discussion on humanity. What makes us human? What makes humans different from other animals? Is it our use of tools? Language and speech? Our high intelligence? Our ability to invent and to create technology? Our compassion and love for each other? Our self-awareness? The fact that we philosophize, that we bother to ask this question? Does it relate to spirituality and the notion of the soul? Is it our ability and desire to tell stories? What are we discovering about this topic each year through human DNA research, and related studies such as that of the neanderthal genome?
-
For next week, we are going to read Chapter 5 of Blown to Bits.
Wed Oct 26 2011 3:20 PM
Week 5: Honors Section #4
This week we did the following in our honors section:
Wed Oct 19 2011 3:20 PM
Week 4: Honors Section #3
This week we did the following in our honors section:
-
We talked about Chapter 2 from Blown to Bits. Relevant issues and questions:
-
Is there any info out there about you on the web that embarrasses you? That you wish could be taken down? (For Marty, the answer is yes.)
-
How much info do you give out about yourself on sites like Facebook? Do you turn on privacy settings, or do you like to give out lots of information?
-
Is it really possible to browse the web anonymously?
-
What other behaviors of ours are "watched," such as credit cards, grocery "loyalty cards, public security cameras, locators in cell phones, etc.?
-
For what purpose will the large amount of data being gathered about us be used? Will it mostly be commercial, such as Amazon.com recommending products? Legal, such as speeding tickets and catching wanted criminals?
-
How does this relate to recent laws such as the PATRIOT Act and wiretapping?
-
We talked about digital watermarking.
-
We talked about data gathered by RFID tags and its possible implications.
-
For next week, we are going to read Chapter 3 of Blown to Bits.
Wed Oct 12 2011 3:20 PM
Week 3: Honors Section #2
This week we did the following in our honors section:
-
We talked about Chapter 1 from Blown to Bits. Relevant issues and questions:
-
What aspects of our lives, what technologies, are now becoming more digital? Is this a good or bad thing overall?
-
What changes about information once it becomes digital? (compare to analog versions)
-
What will/should/can we do with all the increase in processing power described by Moore's Law? What could we do if processors were 10x as fast as they are now? 1000x?
-
We rarely delete information now because storage is so cheap. Do we have enough space to just store everything? Is there anything bad about complete and permanent storage of all data associated with everything?
-
What are some tools that accelerate the spread of information? Is the information being spread largely good and correct?
-
Can a technology be inherently "good" or "bad"? Is any particular technology so likely to be used for "bad" purposes that it becomes evil in itself? (possible examples: bittorrent, pirate bay; weapons technology)
-
We learned the ternary operator
? :
in Java (Wikipedia).
-
For next week, we are going to read Chapter 2 of Blown to Bits.
Wed Oct 5 2011 3:20 PM
Week 2: Honors Section #1
This week we did the following in our honors section:
-
Introduced ourselves to each other.
-
Talked about the fuzzy question of, "What is computer science?"
-
Marty talked about why he became a teacher.
-
We saw a few quirks of the Java
int
and double
types, such as overflow and floating-point round-off errors. We also learned a bit about how numbers are represented in binary in the computer.
-
For next week, we are going to read Chapter 1 of the book Blown to Bits by Abelson, Ledeen, and Lewis. The book is about the explosion of digital information and data now available and how it impacts our society, our privacy, our happiness, and our lives. It is available as a free PDF download, or the physical book can be ordered from Amazon.com and other retailers.
Wed Sep 28 2011 3:20 PM
Week 1
Honors sections will begin in Week 2.
This information is heavily based on the honors section run by Stuart Reges. Thanks to Stuart for his help!
This quarter we are offering an opportunity for an honors experience this quarter in CSE 142. This is intended for students in the honors program and other high-achieving students. The students who participate will meet with me and one or more TAs once a week in a small group to discuss what I consider to be interesting issues, mostly issues in computer science but sometimes outside our field.
I don't believe in just giving honors students more work. In fact, I won't be asking people to write any programs for this. The main requirement is that you have to agree to show up each week and to participate in our discussions. This quarter I will also ask the students in the honors section to do some reading, either chapters from a paperback book relevant to CSE topics (that you would have to purchase), and/or from articles posted on the course web site from time to time.
Students in the honors section are graded in the same way as everyone else in the class, but their transcript will indicate that they took an honors version of the 142 class. This is most important for honors students who have to accumulate a certain number of honors credits.
In terms of what other topics we'll discuss, I expect it to be something of a grab-bag of topics that interest me. Here are some examples of possible topics we may discuss:
-
What is a computer? What is computation? What are the limits of computers, and where are they headed?
-
What is computer science really all about? There are lots of amazing areas of our field that we can read about and discuss. Some examples: quantum computing, computer vision, scientific computing, RFID, theory of computation, security, robotics, data mining, ...
-
What is artificial intelligence? Can a computer ever completely simulate a human brain? If it can, is this a good thing? What is the nature of human intelligence, anyway?
-
I don't do formal research, but my area of expertise is computer science education, particularly at the intro level. There is a lot of discussion going on right now about what we should teach in intro and how we should teach it. Also, there is a large gender gap in CSE at UW and nationwide. Why is that? What can we do about it? Should we do something about it?
We will soon post an application form where students can apply to be considered for the honors section. The potential meeting times will be listed on the application form.