{"id":"https://openalex.org/W7128811053","doi":"https://doi.org/10.1145/3770761.3777362","title":"Code, Test, Battle: Gamifying CS2 Through Adversarial Programming Tournaments","display_name":"Code, Test, Battle: Gamifying CS2 Through Adversarial Programming Tournaments","publication_year":2026,"publication_date":"2026-02-13","ids":{"openalex":"https://openalex.org/W7128811053","doi":"https://doi.org/10.1145/3770761.3777362"},"language":null,"primary_location":{"id":"doi:10.1145/3770761.3777362","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777362","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3770761.3777362","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089521510","display_name":"Rifat Sabbir Mansur","orcid":"https://orcid.org/0009-0007-2490-3828"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]},{"id":"https://openalex.org/I1315778391","display_name":"Lehigh Valley Hospital-Pocono","ror":"https://ror.org/01w09ak35","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I1315778391","https://openalex.org/I4210094360"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rifat Sabbir Mansur","raw_affiliation_strings":["Penn State Lehigh Valley, Center Valley, PA, USA"],"affiliations":[{"raw_affiliation_string":"Penn State Lehigh Valley, Center Valley, PA, USA","institution_ids":["https://openalex.org/I1315778391","https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089521510"],"corresponding_institution_ids":["https://openalex.org/I130769515","https://openalex.org/I1315778391"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79032827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1441","last_page":"1442"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.7972999811172485,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.7972999811172485,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.1282999962568283,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11574","display_name":"Artificial Intelligence in Games","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6254000067710876},{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.5388000011444092},{"id":"https://openalex.org/keywords/battle","display_name":"Battle","score":0.5031999945640564},{"id":"https://openalex.org/keywords/waterfall-model","display_name":"Waterfall model","score":0.4537999927997589},{"id":"https://openalex.org/keywords/narrative","display_name":"Narrative","score":0.4341999888420105},{"id":"https://openalex.org/keywords/hero","display_name":"HERO","score":0.42170000076293945},{"id":"https://openalex.org/keywords/pair-programming","display_name":"Pair programming","score":0.4187999963760376},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4169999957084656},{"id":"https://openalex.org/keywords/extreme-programming","display_name":"Extreme programming","score":0.36480000615119934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6614000201225281},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6254000067710876},{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.5388000011444092},{"id":"https://openalex.org/C2778627824","wikidata":"https://www.wikidata.org/wiki/Q178561","display_name":"Battle","level":2,"score":0.5031999945640564},{"id":"https://openalex.org/C20505762","wikidata":"https://www.wikidata.org/wiki/Q478175","display_name":"Waterfall model","level":3,"score":0.4537999927997589},{"id":"https://openalex.org/C199033989","wikidata":"https://www.wikidata.org/wiki/Q1318295","display_name":"Narrative","level":2,"score":0.4341999888420105},{"id":"https://openalex.org/C51364203","wikidata":"https://www.wikidata.org/wiki/Q1563532","display_name":"HERO","level":2,"score":0.42170000076293945},{"id":"https://openalex.org/C174063052","wikidata":"https://www.wikidata.org/wiki/Q607013","display_name":"Pair programming","level":4,"score":0.4187999963760376},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4169999957084656},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3955000042915344},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.37059998512268066},{"id":"https://openalex.org/C122944926","wikidata":"https://www.wikidata.org/wiki/Q209711","display_name":"Extreme programming","level":5,"score":0.36480000615119934},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.362199991941452},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.35040000081062317},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C148027188","wikidata":"https://www.wikidata.org/wiki/Q907375","display_name":"Unit testing","level":3,"score":0.3312000036239624},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.32359999418258667},{"id":"https://openalex.org/C194519906","wikidata":"https://www.wikidata.org/wiki/Q7627827","display_name":"Student engagement","level":2,"score":0.2971999943256378},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C77967617","wikidata":"https://www.wikidata.org/wiki/Q4677561","display_name":"Active learning (machine learning)","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.2728999853134155},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.25949999690055847},{"id":"https://openalex.org/C2780902518","wikidata":"https://www.wikidata.org/wiki/Q6033780","display_name":"Inheritance (genetic algorithm)","level":3,"score":0.25609999895095825},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.2542000114917755},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.25270000100135803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3770761.3777362","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777362","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3770761.3777362","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3770761.3777362","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W4200011425","https://openalex.org/W4290461078","https://openalex.org/W4304693637","https://openalex.org/W4308834103","https://openalex.org/W4403585334"],"related_works":[],"abstract_inverted_index":{"As":[0],"abstract":[1,97],"concepts":[2,98],"like":[3,32],"inheritance":[4],"and":[5,19,35,84,101,117,153,175],"algorithm":[6],"analysis":[7],"increase":[8],"in":[9,14,134],"complexity,":[10],"maintaining":[11],"student":[12],"engagement":[13,170],"CS2":[15,48,189],"courses":[16],"is":[17],"difficult,":[18],"traditional":[20],"lecture":[21],"methods":[22],"often":[23],"fail":[24],"to":[25,125],"motivate":[26],"students":[27],"or":[28],"emphasize":[29],"critical":[30],"skills":[31],"test-driven":[33],"development":[34],"collaboration.":[36],"We":[37],"present":[38],"Dungeon":[39,150],"Master,":[40],"a":[41,51,93],"gamified":[42],"tournament-based":[43],"learning":[44,177],"system":[45,104,142],"that":[46,182],"transforms":[47],"curriculum":[49],"into":[50,75,159],"progressive,":[52],"competitive,":[53],"collaborative":[54,176],"experience.":[55],"Student":[56],"teams":[57,121],"build":[58],"hero":[59],"characters":[60],"throughout":[61],"the":[62,141,149],"semester,":[63],"with":[64,169],"each":[65],"programming":[66],"concept":[67,172],"manifested":[68],"as":[69],"character":[70],"capabilities:":[71],"basic":[72],"objects":[73],"evolve":[74],"specialized":[76],"classes":[77,158],"using":[78,114],"inheritance,":[79],"manage":[80],"inventories":[81],"through":[82],"collections,":[83],"execute":[85],"battle":[86,113],"strategies":[87],"via":[88,148],"recursive":[89],"algorithms.":[90],"This":[91],"creates":[92],"cohesive":[94],"narrative":[95],"where":[96,110,120],"become":[99],"tangible":[100],"meaningful.":[102],"The":[103],"features":[105],"dual":[106],"competition:":[107],"automated":[108,146],"tournaments":[109],"student-designed":[111],"heroes":[112],"implemented":[115],"algorithms,":[116],"adversarial":[118],"testing":[119],"write":[122],"unit":[123],"tests":[124],"validate":[126],"their":[127],"code":[128],"while":[129,191],"exposing":[130],"opponent":[131],"flaws.":[132],"Grounded":[133],"Eyal's":[135],"Hook":[136],"Model":[137],"for":[138],"behavioral":[139],"engagement,":[140],"integrates":[143],"Git":[144],"workflows,":[145],"evaluation":[147],"Master":[151],"API,":[152],"live":[154],"tournament":[155],"events":[156],"transforming":[157],"spectator":[160],"experiences.":[161],"Preliminary":[162],"deployment":[163],"(N=25":[164],"students)":[165],"demonstrates":[166,181],"high":[167],"satisfaction":[168],"(5/5),":[171],"clarity":[173],"(4.3/5),":[174],"(4.8/5).":[178],"Our":[179],"work":[180],"theoretically":[183],"grounded":[184],"gamification":[185],"can":[186],"substantially":[187],"enhance":[188],"education":[190],"developing":[192],"professional":[193],"software":[194],"engineering":[195],"practices.":[196]},"counts_by_year":[],"updated_date":"2026-02-15T05:58:04.055770","created_date":"2026-02-14T00:00:00"}
