Author of the publication

Creative Coding and Visual Portfolios for CS1

, , and . Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, page 247--252. New York, NY, ACM, (2012)
DOI: 10.1145/2157136.2157214

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BigBasket Fairness Analysis for Searched Outputs., , , and . ICCCNT, page 1-6. IEEE, (2023)Impact Of Ranking Of Organic Search Results On The Incrementality Of Search Ads, , , and . Google Inc., (2012)Aggregate discovery and retrieval of contents from authenticated interface., , , and . IC3, page 399-403. IEEE, (2013)Science and the Raj, 1857--1905. Oxford University Press, Delhi, (1995)NESP: Nonlinear enhancement and selection of plane for optimal segmentation and recognition of scene word images., , and . DRR, volume 8658 of SPIE Proceedings, page 865806. SPIE, (2013)Evaluation of document binarization using eigen value decomposition., , and . DRR, volume 8658 of SPIE Proceedings, page 86580X. SPIE, (2013)Computational Studies of Transmembrane Proteins. Karlsruhe University, Germany, (2022)base-search.net (ftubkarlsruhe:oai:EVASTAR-Karlsruhe.de:1000152704).Lowering overhead in sampling-based execution monitoring and tracing., , and . LCTES, page 101-110. ACM, (2011)Optimal Sizing of Security Constrained Unit Commitment Problem Integrated with Renewable Energy Sources and PEVs., , , , , , and . ECAI, page 1-5. IEEE, (2023)Erays: Reverse Engineering Ethereum's Opaque Smart Contracts., , , , , and . USENIX Security Symposium, page 1371-1385. USENIX Association, (2018)