Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of Australian teachers' self-efficacy and assessment approaches for the K-12 digital technologies curriculum., and . WiPSCE, page 5:1-5:10. ACM, (2018)Parsons Problems usage within a MOOC Pedagogy: (Abstract Only)., , and . SIGCSE, page 1111. ACM, (2018)Designing and supporting collaborative learning activities., and . SIGCSE, page 537-538. ACM, (2013)Understanding Problems through Assignment Presentation: A Replication Study., , and . FIE, page 1-8. IEEE, (2019)EmoMent: An Emotion Annotated Mental Health Corpus from Two South Asian Countries., , , , , , , and . COLING, page 6991-7001. International Committee on Computational Linguistics, (2022)Security Architecture Framework for Enterprises., , , and . ICEIS (Revised Selected Papers), volume 417 of Lecture Notes in Business Information Processing, page 883-904. Springer, (2020)A Comprehensive Pattern-Driven Security Methodology for Distributed Systems., , and . Australian Software Engineering Conference, page 142-151. IEEE Computer Society, (2014)Topology Estimation for Thousand-Camera Surveillance Networks., , , , , , , and . ICDSC, page 195-202. IEEE, (2007)Estimating camera overlap in large and growing networks., , , , , , , , and . ICDSC, page 1-10. IEEE, (2008)Online Behavior Identification in Distributed Systems., , and . SRDS, page 202-211. IEEE Computer Society, (2015)