Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mind your language: on novices' interactions with error messages., , and . Onward!, page 3-18. ACM, (2011)WeScheme: the browser is your programming environment., , , and . ITiCSE, page 163-167. ACM, (2011)CaptainTeach: multi-stage, in-flow peer review for programming assignments., , , and . ITiCSE, page 267-272. ACM, (2014)Observations on the Design of Program Planning Notations for Students., , and . SIGCSE (1), page 1133-1139. ACM, (2024)Evolving a K-12 Curriculum for Integrating Computer Science into Mathematics., , , , , , , , , and . SIGCSE, page 59-65. ACM, (2021)Embracing policy engineering., , and . FoSER, page 109-110. ACM, (2010)CounterMeasures: A game for teaching computer security., , , , and . NETGAMES, page 1-6. IEEE, (2011)Verification and change-impact analysis of access-control policies., , , and . ICSE, page 196-205. ACM, (2005)A model of triangulating environments for policy authoring., and . SACMAT, page 3-12. ACM, (2010)Modelling and Model Checking a Distributed Shared Memory Consistency Protocol., and . ICATPN, volume 1420 of Lecture Notes in Computer Science, page 84-103. Springer, (1998)