Author of the publication

Multiple case study of nerd identity in a CS1 class

, , and . Proceedings of the 45th ACM technical symposium on Computer science education, page 325--330. New York, NY, ACM, (2014)
DOI: https://doi.org/10.1145/2538862.2538933

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kerberos Security with Clocks Adrift., and . USENIX Security Symposium, USENIX Association, (1995)Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML.. USENIX Annual Technical Conference, General Track, page 65-78. USENIX, (2001)A Java Development and Runtime Environment for Reconfigurable Computing., , , , , , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 43-48. Springer, (1998)Cryptographic Randomness from Air Turbulence in Disk Drives., , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 114-120. Springer, (1994)Learning in Discussion Forums: An Analysis of Knowledge Construction in a Gaming Affinity Space., and . Int. J. Game Based Learn., 6 (3): 1-17 (2016)Kerberos Plus RSA for World Wide Web Security.. USENIX Workshop on Electronic Commerce, USENIX Association, (1995)Network Security via Private-Key Certificates., and . ACM SIGOPS Oper. Syst. Rev., 24 (4): 64-67 (1990)Compliance Defects in Public Key Cryptography.. USENIX Security Symposium, USENIX Association, (1996)ACEcard: A High-Performance Architecture for Run-Time Reconfiguration., and . IPPS/SPDP, page 616-619. IEEE Computer Society, (1998)Visualizing Live Collaboration in the Classroom with AMOEBA., , and . CSCL (2), page 2-5. International Society of the Learning Sciences, LuLu, Amazon, (2013)