Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

"Thanks Alisha, Keep in Touch": Gender Effects and Engagement with Virtual Learning Companions., , , , , , , and . AIED, volume 10331 of Lecture Notes in Computer Science, page 299-310. Springer, (2017)Inducing Stealth Assessors from Game Interaction Data., , , , , and . AIED, volume 10331 of Lecture Notes in Computer Science, page 212-223. Springer, (2017)CS Principles Goes to Middle School: Learning How to Teach ``Big Data'', , , , , and . Proceedings of the 45th ACM Technical Symposium on Computer Science Education, page 151--156. New York, NY, ACM, (2014)A Practical Guide to Developing and Validating Computer Science Knowledge Assessments with Application to Middle School., , , , , and . SIGCSE, page 622-627. ACM, (2015)ENGAGE: A Game-based Learning Environment for Middle School Computational Thinking., , , , , , , , , and . SIGCSE, page 440. ACM, (2015)CS principles goes to middle school: learning how to teach "Big Data"., , , , , and . SIGCSE, page 151-156. ACM, (2014)Empowering All Students: Closing the CS Confidence Gap with an In-School Initiative for Middle School Students., , , , , and . SIGCSE, page 382-387. ACM, (2016)DeepStealth: Leveraging Deep Learning Models for Stealth Assessment in Game-Based Learning Environments., , , , , , and . AIED, volume 9112 of Lecture Notes in Computer Science, page 277-286. Springer, (2015)