Author of the publication

Detecting ChatGPT-Generated Code in a CS1 Course.

, , , , , and . LLM@AIED, volume 3487 of CEUR Workshop Proceedings, page 53-63. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interleaved Sketch: Toward Consistent Network Telemetry for Commodity Programmable Switches., , , and . IEEE Access, (2019)Any ZeaD Formula of Six Instants Having No Quartic or Higher Precision with Proof., , , , and . ICSAI, page 705-709. IEEE, (2018)Deep neural network based i-vector mapping for speaker verification using short utterances., , , , , , and . Speech Commun., (2018)Solving future equation systems using integral-type error function and using twice ZNN formula with disturbances suppressed., and . J. Frankl. Inst., 356 (4): 2130-2152 (2019)Convergence analysis of estimation algorithms for dual-rate stochastic systems., , and . Appl. Math. Comput., 176 (1): 245-261 (2006)ColorCook: Augmenting Color Design for Dashboarding with Domain-Associated Palettes., , , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-25 (2022)Single- and Two-Phase Open-Circuit Fault Tolerant Control for Dual Three-Phase PM Motor Without Phase Shifting., , , , , and . IEEE Access, (2020)A Survey on Edge and Edge-Cloud Computing Assisted Cyber-Physical Systems., , , , , and . IEEE Trans. Ind. Informatics, 17 (11): 7806-7819 (2021)Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation., , , , and . IEEE Access, (2016)Calliope: Automatic Visual Data Story Generation from a Spreadsheet., , , , and . CoRR, (2020)