Author of the publication

Reflective Structuration of Knowledge Building Practices in Grade 5 Science: A Two-Year Design-Based Research.

, , and . CSCL, International Society of the Learning Sciences, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DTW-KNN Implementation for Touch-based Authentication System., and . BigCom, page 318-322. IEEE, (2019)Severe motion blurred silkworm pupae image restoration in sex discrimination., , , , and . Signal Image Video Process., 17 (5): 1985-1996 (July 2023)An Implicit Authentication Solution based on User's Keystroke Behavior of Smartphone Usage., , , , and . ICCE-TW, page 1-2. IEEE, (2019)A DRL based Real-time Computing Load Scheduling Method., , , , , and . ICCE-TW, page 1-2. IEEE, (2021)Resource Scheduling and Data Locality for Virtualized Hadoop on IaaS Cloud Platform., , , and . BigCom, volume 9784 of Lecture Notes in Computer Science, page 332-341. Springer, (2016)LSTM Model-based Subway Passenger Flow Forecast Solution., , and . ICCE-Taiwan, page 393-394. IEEE, (2023)Reflective Structuration of Knowledge Building Practices in Grade 5 Science: A Two-Year Design-Based Research., , and . CSCL, International Society of the Learning Sciences, (2017)How Did a Grade 5 Science Community Co-Construct Collective Structures of Inquiry?, and . CSCL, International Society of the Learning Sciences, (2017)A hybrid web log based intrusion detection model., , and . CCIS, page 356-360. IEEE, (2016)Sensor Data Normalization Among Heterogeneous Smartphones for Implicit Authentication., , and . ICA3PP (3), volume 13157 of Lecture Notes in Computer Science, page 331-345. Springer, (2021)