How domain experts use an embedded DSL

L Rennels, SE Chasins - Proceedings of the ACM on Programming …, 2023 - dl.acm.org
Programming tools are increasingly integral to research and analysis in myriad domains,
including specialized areas with no formal relation to computer science. Embedded domain …

Data systems education: curriculum recommendations, course syllabi, and industry needs

D Miedema, T Taipalus, VV Ajanovski… - 2024 Working Group …, 2025 - dl.acm.org
Data systems have been an important part of computing curricula for decades, and an
integral part of data-focused industry roles such as software developers, data engineers …

Exploring Self-Explanations in a Flipped Database Course

N Sibia, AZ Bernuy, E Tran, JJN Xu… - Proceedings of the 3rd …, 2024 - dl.acm.org
Self-explanations show promise for engaging students with preparatory materials, yet
research into the types of self-explanations submitted in computing is limited. This paper …

Building Blocks Towards More Effective SQL Error Messages

T Taipalus, H Grahn - Proceedings of the 2024 on Innovation and …, 2024 - dl.acm.org
Reading and interpreting error messages are significant aspects of a software developer's
work. Despite the importance and prevalence of error messages, especially for novices, SQL …

On the effects of logical database design on database size, query complexity, query performance, and energy consumption

T Taipalus - arxiv preprint arxiv:2501.07449, 2025 - arxiv.org
Database normalization theory is the basis for logical design of relational databases.
Normalization reduces data redundancy and consequently eliminates potential data …

AI-Driven Secure Coding: Revolutionizing Source Code Defense

MNUR Chowdhury, MSS Chowdhury… - 2024 International …, 2024 - ieeexplore.ieee.org
Secure coding is a paramount practice in software development, serving to safeguard
applications against vulnerabilities and security breaches. Traditionally, this process has …

[PDF][PDF] On Learning SQL: Disentangling concepts in Data Systems Education

DE Miedema - 2024 - research.tue.nl
The relational model was established in 1970 by Codd as a way to organize structured data.
The model stores all data grouped together in a set of tables related to one another by …

[PDF][PDF] Can You See It?-NOP! A Practitioners Study

This study delves into how human intuition detects evasion attacks. Through a suggested
online survey with industry and academic practitioners, we will analyze the detection of …