Weak Behavioral Subtyping for Types with Mutable Objects

Total Page:16

File Type:pdf, Size:1020Kb

Weak Behavioral Subtyping for Types with Mutable Objects Electronic Notes in Theoretical Computer Science URL httpwwwelsevier nlloc ateen tcsvo lume html pages Weak Behavioral Subtyping for Typ es with Mutable Ob jects Krishna Kishore Dhara and Gary T Leavens Department of Computer Science Atanaso Hal l Iowa State University Ames Iowa USA dhara cs iastate edu and leavens cs iastate edu Abstract This pap er studies the question of when one abstract data typeADTisabehav ioral subtyp e of another and prop oses a mo deltheoretic notion of weak b ehavioral subtyping Weak b ehavioral subtyping p ermits sup ertyp e abstraction to b e a sound and mo dular reasoning principle in a language with mutation and limited forms of aliasing The necessary restrictions on aliasing can b e statically checked Weak b e havioral subtyping allows typ es with mutable ob jects to b e subtyp es of typ es with immutable ob jects Intro duction Subtyping is a fundamental semantic concept in ob jectoriented OO lan guages In this pap er we study behavioral subtyping when one ADTs ob jects act like those of another Knowing the conditions on b ehavioral subtyping is imp ortant for guiding the design of ADTs It is also critical for proving the soundness of logics for OO program verication Previous work on the mo del theory of b ehavioral subtyping has not allowed mutation and aliasing But mutation and aliasing are imp ortant in practical OO programming and manytyp es o ccurring in practice have ob jects with mutable timevarying state Although it is p ossible to imagine an OO language where aliasing is eliminated entirely existing OO languages do p ermit aliasing Unlike Liskov and Wing wedonotallow arbi trary aliasing but instead seek a middle ground that p ermits more b ehavioral subtyp e relationships The purp ose of our study is ultimately to showhow to reason in a mo d ular fashion ab out OO programs By modular reasoning we mean reasoning such that conclusions ab out unchanged co de remain valid when new b ehav ioral subtyp es are added to a program One mo dular reasoning technique is This work was supp orted in part by the National Science Foundation under GrantCCR c Elsevier Science B V Open access under CC BY-NC-ND license. Dhara and Leavens supertype abstraction in which one reasons ab out the eects of metho d sends using the prop erties of the static typ es of the sub expressions The pur p ose and justication of a denition of b ehavioral subtypingisthatitmakes sup ertyp e abstraction sound Our technical approachtoshowing that a denition of b ehavioral sub typing makes sup ertyp e abstraction sound is to capture the conclusions of reasoning via sup ertyp e abstraction in a set of exp ected b ehaviors Behav iors that might o ccur b ecause of subtyping are called surprising if they fall outside this set Thus showing that a denition of b ehavioral subtyp e is ad equate means showing that no surprising b ehavior is p ossible when subtyping relationships are required to satisfy the denition In this pap er we dene weak b ehavioral subtyping This denition is weaker than either of Liskov and Wings denitions b ecause it allows typ es with mutable ob jects hereinafter mutable types tobesubtyp es of immutable typ es Wesketch the semantics of a programming language with the necessary aliasing control and showthatweak b ehavioral subtyping is adequate in the sense describ ed ab ove Finally we discuss related work and present some conclusions In this pap er we do not present the mo del theory of stronger denitions of b ehavioral subtyping The Problem Reasoning problem with behavioral subtyping and aliasing The following example motivates reasoning problems with b ehavioral subtyp ing Consider the typ es BoolSeq and StoreBool with the following metho ds The typ e BoolSeq is a typ e of b o olean sequences which has only immutable ob jects The messages one can send to a BoolSeq are the following method fetchs BoolSeq i Int Bool method updates BoolSeq i Int b Bool BoolSeq The update metho d pro duces a new ob ject which has the same state as the argument s except that in the ith p osition it contains v The typ e StoreBool has mutable ob jects It has the following metho ds A return typ e of Void indicates no result of any useful typ e is returned method fetchs BoolStore i Int Bool method storesBoolStore iInt bBool Void There is no subtyp e relationship b etween BoolSeq and StoreBool Sup pose we wish to reason ab out the part of a program whichwe will call an observation in which the following variables are available bseq BoolSeq storb StoreBool b Bool The observation itself consists of a variable declaration and three commands the declaration names a variable that will b e the output of the observation The messages not and equal have their standard meaning for Bool arguments output Bool Dhara and Leavens b fetchbseq storestorb notb output equalb fetchbseq What is the exp ected set of p ossible values for output in the ab ove observa tion The exp ected set dep ends on three p oints Whether ones reasoning technique p ermits one to assume that identiers of unrelated typ es suchas BoolSeq and StoreBool cannot b e directly aliased Whether bseq and storb can b e aliases for the same ob ject The notion of b ehavioral subtyping allowed These three p oints are not completely indep endent Using Liskov and Wings denitions of b ehavioral subtyp e BoolSeq and StoreBool cannot have a common subtyp e b ecause BoolSeq ob jects are immutable and thus a com mon subtyp e would have to violate a history constraint or would havea mu tator corresp onding to store that could not b e explained So using Liskov and Wings denition prohibits bseq and storb from b eing directly aliased If bseq and storb cannot b e directly aliased the set of exp ected results would be ftrue g If ones reasoning technique forces one to think ab out a case where bseq and storb might b e directly aliased then the set of exp ected results dep ends on the notion of b ehavioral subtyping used If one had a weaker notion of b ehavioral subtyping than Liskov and Wings then it might b e p ossible for BoolSeq and StoreBool to have a common subtyp e with mutable ob jects Then bseq and storb could b e directly aliased and so presumably the set of exp ected results for the observation ab ovewould b e ftrue false g Wehave not explored such reasoning techniques whichwere suggested to us by Ian Maung However b ecause ob jects of typ e BoolSeq are immutable and the call of a mutator store is used in the program it is dicult to imagine the sp ecication of a most general common subtyp e of BoolSeq and StoreBool Another problem we see is that psychologically programmers would tend to think that b ecause bseq is immutable the only p ossible result would b e true without considering aliasing Thus such a reasoning technique mightbe errorprone if used informallyWe leavetheinvestigation of such a reasoning technique and adequate notions of b ehavioral subtyping for it as an op en problem The remaining case is where ones reasoning technique p ermits one to assume that identiers of unrelated typ es cannot b e directly aliased Clearly in this case such an assumption has to b e enforced If it is then set of exp ected results of the observation ab oveisftrue g However in this case there is still the p ossibility that BoolSeq and StoreBool have a common subtyp e Allowing common subtyp es suchasMutableBSeq would havea great practical b enet That b enet however should b e weighed against any restrictions on aliasing Dhara and Leavens Thus our problem is twofold to dene a notion of b ehavioral subtyping that is weaker than Liskov and Wings and to state restrictions on aliasing such that it is adequate for reasoning We refer to our notion of subtyping as weak b ehavioral subtyping Reasoning with weak behavioral subtyping By reasoning we mean mo delbased reasoning with sup ertyp e abstraction and with the assumption that identiers of unrelated typ es cannot b e directly aliased For the soundness of such reasoning techniques the notion of weak b e havioral subtyping should prevent unexp ected b ehavior when subtyp e ob jects are manipulated according to sp ecications of their sup ertyp es As an example supp ose we wish to reason ab out an observation of the following variables bseq BoolSeq b Bool The observation itself is as follows where again the declaration gives the output variable for the observation output Bool b fetchbseq updatebseq notb output equalfetchbseq b Reasoning at the static typ es in the ab ove observation one would obtain the set of exp ected results values for output tobe ftrueg Consider a new typ e DestructBSeq which resp onds to the same set of metho ds as BoolSeq but such that the metho d update for DestructBSeq mutates its rst argument The question is can DestructBSeq be a weak b ehavioral subtyp e of BoolSeq If DestructBSeq were to b e a weak b ehavioral subtyp e of BoolSeq then one could have a state where bseq denotes an ob ject of typ e DestructBSeq The set of results of the ab ove observation in such a state is false whichis an unexp ected result This unexp ected b ehavior makes reasoning techniques based on sup ertyp e abstraction unsound Hence DestructBSeq cannot b e a weak b ehavioral subtyp e of BoolSeq We consider soundness of sup ertyp e abstraction as an imp ortant criteria for dening weak b ehavioral subtyp e re lations and show a no surprises result which guarantees exp ected b ehavior The Language INST and its Semantics Our mo deltheoretic approach to solving this problem was describ ed ab ove To carry out this approach
Recommended publications
  • Communications Cacm.Acm.Org of Theacm 06/2009 Vol.52 No.06
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 06/2009 VOL.52 NO.06 One Laptop Per Child: Vision vs. Reality Hard-Disk Drives: The Good, The Bad, and the Ugly How CS Serves The Developing World Network Front-End Processors The Claremont Report On Database Research Autonomous Helicopters Association for Computing Machinery Think Parallel..... It’s not just what we make. It’s what we make possible. Advancing Technology Curriculum Driving Software Evolution Fostering Tomorrow’s Innovators Learn more at: www.intel.com/thinkparallel ACM Ad.indd 1 4/17/2009 11:20:03 AM ABCD springer.com Noteworthy Computer Science Journals Autonomous Biological Personal and Robots Cybernetics Ubiquitous G. Sukhatme, University W. Senn, Universität Bern, Computing of Southern California, Physiologisches Institut; ACM Viterbi School of Engi- J. Rinzel, National neering, Dept. Computer Institutes of Health (NIH), P. Thomas, Univ. Coll. Science Dept. Health Education & London Interaction Centre Autonomous Robots Welfare; J. L. van Hemmen, reports on the theory and TU München, Abt. Physik Personal and Ubiquitous applications of robotic systems capable of Biological Cybernetics is an interdisciplinary Computing publishes peer-reviewed some degree of self-sufficiency. It features medium for experimental, theoretical and international research on handheld, wearable papers that include performance data on actual application-oriented aspects of information and mobile information devices and the robots in the real world. The focus is on the processing in organisms, including sensory, pervasive communications infrastructure that ability to move and be self-sufficient, not on motor, cognitive, and ecological phenomena. supports them to enable the seamless whether the system is an imitation of biology.
    [Show full text]
  • NEWS RELEASE Contact: Jim Ormond 212-626-0505
    NEWS RELEASE Contact: Jim Ormond 212-626-0505 [email protected] ACM ANNOUNCES NEW INTERNATIONAL CONFERENCE ON AI IN FINANCE Inaugural Conference to Be Held October 14-16 New York, NY, October 6, 2020 – ACM, the Association for Computing Machinery, will hold the inaugural ACM International Conference on AI in Finance (ICAIF), virtually from October 14-16. Advances in artificial intelligence are having significant impacts on finance, including financial markets, financial services, and the global financial system more broadly. ICAIF is a new scholarly conference to bring together researchers from a variety of disciplines to share technical advances and insights on the effects of AI on the finance world. The ICAIF conference includes participation from academia, government, regulatory agencies, financial institutions, NGOs and other stakeholders in the AI and finance communities. “AI is transforming the finance industry at every level, from the consumer, who might be interacting with an intelligent chatbot during an online banking session, to a bank CEO, who may be investing in new AI technologies to better predict trends, increase revenues, and find more efficient ways to keep financial systems secure,” explained ICAIF Program Chair Tucker Balch, J.P. Morgan AI Research. “We’ve put together a dynamic program of work from top researchers and we invite everyone who has a stake in how AI is shaping finance to join us by registering for the conference.” Visit here to view the entire program. 2020 ACM ICAIF HIGHLIGHTS ICAIF features a distinguished
    [Show full text]
  • Interview with Barbara Liskov ACM Turing Award Recipient 2008 Done at MIT April 20, 2016 Interviewer Was Tom Van Vleck
    B. Liskov Interview 1 Interview with Barbara Liskov ACM Turing Award Recipient 2008 Done at MIT April 20, 2016 Interviewer was Tom Van Vleck Interviewer is noted as “TVV” Dr. Liskov is noted as “BL” ?? = inaudible (with timestamp) or [ ] for phonetic [some slight changes have been made in this transcript to improve the readability, but no material changes were made to the content] TVV: Hello, I’m Tom Van Vleck, and I have the honor today to interview Professor Barbara Liskov, the 2008 ACM Turing Award winner. Today is April 20th, 2016. TVV: To start with, why don’t you tell us a little bit about your upbringing, where you lived, and how you got into the business? BL: I grew up in San Francisco. I was actually born in Los Angeles, so I’m a native Californian. When I was growing up, it was definitely not considered the thing to do for a young girl to be interested in math and science. In fact, in those days, the message that you got was that you were supposed to get married and have children and not have a job. Nevertheless, I was always encouraged by my parents to take academics seriously. My mother was a college grad as well as my father, so it was expected that I would go to college, which in those times was not that common. Maybe 20% of the high school class would go on to college and the rest would not. I was always very interested in math and science, so I took all the courses that were offered at my high school, which wasn’t a tremendous number compared to what is available today.
    [Show full text]
  • Public Regional Meeting Used on Web Site
    World Economic Forum Annual Meeting Resilient Dynamism Davos-Klosters, Switzerland 23-27 January 2013 Co-Chairs : · Frederico Curado, President and Chief Executive Officer, EMBRAER, Brazil; Chair of the Governors for Aviation and Travel for 2013 · Muhtar A. Kent, Chairman of the Board and Chief Executive Officer, The Coca-Cola Company, USA · Huguette Labelle, Chair, Transparency International, Germany; Global Agenda Council on Responsible Mineral Resources Management · Andrew N. Liveris, Chairman and Chief Executive Officer, The Dow Chemical Company, USA · Atsutoshi Nishida, Chairman of the Board, Toshiba Corporation, Japan · Axel A. Weber, Chairman of the Board of Directors, UBS, Switzerland Programme As of 16 January 2013 Tuesday 22 January Registration Opens Please pick up your badge at registration on Kurgartenstrasse. However, access to the Congress Centre will only begin at 14.00. Interactive Session World Economic Forum Vision and Mission Professor Klaus Schwab invites all newcomers and interested participants to a briefing on the institution's strategic vision and latest initiatives. Plenary Session Welcoming Address by the Executive Chairman Simultaneous interpretation in all languages This session is on the record and webcast live. Plenary Session 1 / 55 Crystal Award Ceremony The World Economic Forum's Crystal Award honours artists who have used their art to improve the state of the world. Simultaneous interpretation in all languages This session is on the record and webcast live. Concert Special Concert Performance This special welcome concert will feature the Moscow Virtuosi Chamber Orchestra, with talented young soloists, under the leadership of Maestro Vladimir Spivakov. The programme will include works by Mozart, Tchaikovsky, Rachmaninov, Paganini, Boccherini, Rossini, Puccini and Piazzolla.
    [Show full text]
  • Jeannette M. Wing Data Science Institute Columbia University 550 W
    Jeannette M. Wing Columbia University 313 Low Library, Mail Code 4310 535 West 116th Street New York, NY 10027 [email protected] (212) 854-1696 www.cs.columbia.edu/∼wing/ Research Interests Trustworthy AI, trustworthy computing, privacy, security, software specification and verification, distributed and concurrent systems, programming languages, programming methodology, software engineering. Education June 1983 Massachusetts Institute of Technology Cambridge, MA Ph.D. in Computer Science Thesis: A Two-Tiered Approach to Specifying Programs. Advisor: John Guttag. Minor in logic and number theory. June 1979 Massachusetts Institute of Technology Cambridge, MA S.M. in Electrical Engineering and Computer Science. Thesis: Partial-Match Retrieval Using Tries, Hashing, and Superimposed Codes. Advisors: Ronald Rivest (MIT) and John Reiser (Bell Labs). VI-A co-operative student in Computer Science with AT&T Bell Laboratories. June 1979 Massachusetts Institute of Technology Cambridge, MA S.B. in Computer Science and Engineering. VI-A co-operative student in Computer Science with AT&T Bell Laboratories. Employment History 2017– Columbia University New York, NY Executive Vice President for Research, 2021–. Avanessians Director of the Data Science Institute, 2017–2021. Professor of Computer Science, 2017–. Zuckerman Mind, Brain, and Behavior Institute, Affiliate Member, 2018–. 2013–2017 Microsoft Research Redmond, WA Corporate Vice President, Microsoft Research, July 2013–June 2017; Head of MSR Labs, September 2014– June 2017 Vice President, Head of Microsoft Research International, January–July 2013. 1985– Carnegie Mellon University Pittsburgh, PA Adjunct Professor of Computer Science, 2019–. 1 Consulting Professor of Computer Science, 2015–2018. On leave, 2013–2015. President’s Professor of Computer Science, 2004–2013.
    [Show full text]
  • Final Program and Abstracts Book
    ITiCSE 2012 th 17 Annual Conference on Innovation and Technology in Computer Science Education Haifa, Israel, July 3-5, 2012 Final Program and Abstracts Book ITiCSE 2012 Final Program & Abstracts Book Table of Contents A Word of Appreciation ............................................................................... 2 1. Welcome to ITiCSE 2012 ........................................................................ 3 2. Conference Committee ............................................................................. 4 3. Conference Program ................................................................................ 5 Tuesday, July 4, 2012 ........................................................................ 5 Wednesday, July 4, 2012 ................................................................... 6 Thursday, July 5, 2012 ........................................................................ 10 3.1 Keynote Speakers .......................................................................... 16 3.2 Posters I ........................................................................................ 18 Posters II ....................................................................................... 19 4. Abstracts ................................................................................................... 20 4.1 Tuesday Keynote .......................................................................... 20 4.2 Tuesday 18:15-19:30 sessions ....................................................... 20 4.3 Wednesday Keynote ....................................................................
    [Show full text]
  • Jeannette M. Wing Data Science Institute Columbia University 550 W
    Jeannette M. Wing Data Science Institute Columbia University 550 W. 120th St. Mail Code 4720 1401 Northwest Corner New York, NY 10027 [email protected] (212) 853-0681 http://www.cs.cmu.edu/∼wing/ Research Interests Trustworthy computing, privacy, security, software specification and verification, distributed and concurrent systems, programming languages, programming methodology, software engineering. Education June 1983 Massachusetts Institute of Technology Cambridge, MA Ph.D. in Computer Science Thesis: A Two-Tiered Approach to Specifying Programs. Advisor: John Guttag. Minor in logic and number theory. June 1979 Massachusetts Institute of Technology Cambridge, MA S.M. in Electrical Engineering and Computer Science. Thesis: Partial-Match Retrieval Using Tries, Hashing, and Superimposed Codes. Advisors: Ronald Rivest (MIT) and John Reiser (Bell Labs). VI-A co-operative student in Computer Science with AT&T Bell Laboratories. June 1979 Massachusetts Institute of Technology Cambridge, MA S.B. in Computer Science and Engineering. VI-A co-operative student in Computer Science with AT&T Bell Laboratories. Employment History 2017– Columbia University New York, NY Avanessians Director of the Data Science Institute and Professor of Computer Science. 2013–2017 Microsoft Research Redmond, WA Corporate Vice President, Microsoft Research, since July 2013; Head of MSR Labs, since September 2014. Vice President, Head of Microsoft Research International, January–July 2013. 1985– Carnegie Mellon University Pittsburgh, PA Consulting Professor of Computer Science, 2015–. On leave, 2013–2015. President’s Professor of Computer Science, 2004–2013. Head, Computer Science Department, 2004–2007, 2010–2012. Director of Microsoft-Carnegie Mellon Center for Computational Thinking, 2007-2012. 1 Professor of Electrical and Computer Engineering, courtesy, 2005–.
    [Show full text]
  • Formal Methods: Practice and Experience
    Formal Methods: Practice and Experience JIM WOODCOCK University of York PETER GORM LARSEN Engineering College of Aarhus JUAN BICARREGUI STFC Rutherford Appleton Laboratory and JOHN FITZGERALD Newcastle University Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. We describe the state of the art in the industrial use of formal methods, concentrating on their increasing use at the earlier stages of specification and design. We do this by reporting on anewsurveyofindustrialuse,comparingthesituationin2009withthemostsignificantsurveys carried out over the last 20 years. We describe some of the highlights of our survey by presenting aseriesofindustrialprojects,andwedrawsomeobservationsfromthesesurveysandrecordsof experience. Based on this, we discuss the issues surrounding the industrial adoption of formal methods. Finally, we look to the future and describe the development of a Verified Software Repository, part of the worldwide Verified Software Initiative. We introduce the initial projects being used to populate the repository, and describe the challenges they address. Categories and Subject Descriptors: D.2.4 [Software/Program Verification]: Assertion check- ers, Class invariants, Correctness proofs, Formal methods, Model checking, Programming by contract; F.3.1 [Specifying and Verifying and Reasoning about Programs]: Assertions, Invariants, Logics of programs, MechanicalDRAFT verification, Pre- and post-conditions, Specification techniques; F.4.1 [Mathematical Logic]: Mechanical theorem
    [Show full text]
  • Professor Barbara Liskov Has Been Awarded an Honorary
    Professor Barbara Liskov has been awarded an honorary doctorate by the Universitat Politècnica de Catalunya · BarcelonaTech (UPC) for significant contributions to computer science. Professor Barbara Liskov has a degree in mathematics from the University of California, Berkeley. In 1968, she became one of the first women in the United States to be awarded a PhD in computer science, which she received from Stanford University. At present, she is an Institute Professor at MIT and also Associate Provost for Faculty Equity. She is a member of the National Academy of Engineering and the National Academy of Sciences, a fellow of the American Academy of Arts and ciences, and a fellow of the ACM. She received the ACM Turing Award in 2008, the ACM SIGPLAN Programming Language Achievement Award in 2008, the IEEE Von Neumann medal in 2004, a lifetime achievement award from the Society of Women Engineers in 1996, and in 2003 was named one of the 50 most important women in science by Discover Magazine. Her research interests include distributed systems, replication algorithms to provide fault tolerance, programming methodology, and programming languages. Her current research projects include Byzantine-fault-tolerant storage systems and online storage systems that provide confi dentiality and integrity for the information stored. The ceremony took place of the Vèrtex building on 28 September 2012 and professor Núria Castell grave the Laudatio of professor Barbara Liskov. Laudatio of professor Barbara Jane Liskov, by professor Núria Castells, Dean of the Barcelona School of Informatics (FIB), UPC. “Distinguished rector of the Universitat Politècnica de Catalunya · BarcelonaTech, distinguished members of the University Senate and Board of Trustees, authorities and representatives of institutions and companies, lecturers, students, administrative staff, family and friends, and dear Dr.
    [Show full text]
  • Formal Methods: State of the Art and Future Directions EDMUND M
    Formal Methods: State of the Art and Future Directions EDMUND M. CLARKE, JEANNETTE M. WING, ET AL.1 Computer Science Department, Carnegie Mellon University, Pittsburgh, PA ^[email protected]& and ^[email protected]& 1. INTRODUCTION The first part of this report assesses the state of the art in specification and Hardware and software systems will in- verification. For verification, we high- evitably grow in scale and functionality. light advances in model checking and Because of this increase in complexity, theorem proving. In the three sections the likelihood of subtle errors is much on specification, model checking, and greater. Moreover, some of these errors theorem proving, we explain what we may cause catastrophic loss of money, mean by the general technique and time, or even human life. A major goal of software engineering is to enable de- briefly describe some successful case velopers to construct systems that oper- studies and well-known tools. The sec- ate reliably despite this complexity. One ond part of this report outlines future way of achieving this goal is by using directions in fundamental concepts, new formal methods, which are mathemati- methods and tools, integration of meth- cally based languages, techniques, and ods, and education and technology tools for specifying and verifying such transfer. We close with summary re- systems. Use of formal methods does marks and pointers to resources for not a priori guarantee correctness. more information. However, they can greatly increase our understanding of a system by revealing inconsistencies, ambiguities, and incom- 2. STATE OF THE ART pleteness that might otherwise go unde- In the past, the use of formal methods tected.
    [Show full text]
  • Introductory Computer Science Education at Carnegie Mellon University: a Deans' Perspective Randal E
    Introductory Computer Science Education at Carnegie Mellon University: A Deans' Perspective Randal E. Bryant Klaus Sutner Mark J. Stehlik August, 2010 CMU-CS-10-140 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Abstract The School of Computer Science at Carnegie Mellon University is planning major revisions to its introductory course sequence in ways that will affect not just our own students, but also the many students from across campus who take computer science courses. Major changes include: 1) revising our introductory courses to promote the principles of computational thinking, for both majors and nonmajors, 2) increasing our emphasis on the need to make software systems highly reliable and the means to achieve this, and 3) preparing students for a future in which programs will achieve high performance by exploiting parallel execution. Keywords: computer science education, introductory computer science, computational thinking, parallel computing, Java 1 Introduction The School of Computer Science at Carnegie Mellon University is planning major revisions to its introductory course sequence in ways that will affect not just our own students, but also the many students from across campus who take computer science courses. A committee of computer science faculty, chaired by Bob Harper, has done a careful analysis of our current course structure and proposed important changes ([1], included here as Appendix A.) We are indebted to the efforts of these faculty members in thinking about both the intellectual underpinnings of our courses as well as the many practical issues faced when making changes to course structure or content. In this document, we provide the perspective of a Dean, an Associate Dean, and Assistant Dean regarding the introductory portions of our program and the motivations for changing it.
    [Show full text]
  • The Association for Computing Machinery 2 Penn Plaza, Suite 701 New York New York 10121-0701
    Proceedings of 1st ACM SIGSPATIAL Workshop on Geo-computational Thinking in Education (GeoEd 2019) November 5th, 2019 Chicago, Illinois, USA GeoEd ‘19 Workshop Co-chairs: Amr Magdy, University of California, Riverside Coline Dony, American Association of Geographers Proceedings Chair: Amr Magdy, University of California, Riverside Webmaster: Yunfan Kang, University of California, Riverside Sponsors: ACM SIGSPATIAL American Association of Geographers The Association for Computing Machinery 2 Penn Plaza, Suite 701 New York New York 10121-0701 ACM COPYRIGHT NOTICE. Copyright © 2015 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or [email protected]. For other copying of articles that carry a code at the bottom of the first or last page, copying is permitted provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, +1-978-750-8400, +1-978-750-4470 (fax). ACM ISBN: 978-1-4503-6952-7 In 2018, the American Association of Geographers has announced the Encoding Geography initiative, which is a long-term commitment to build capacity and broaden participation for computational thinking within the geography discipline.
    [Show full text]