Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Structured Set of Design Patterns for Learners' Assessment, , , and . Journal of Interactive Learning Research (JILR), 18 (2): 309-333 (2007)Towards a Design Pattern Language to Track Students' Problem-Solving Abilities, , , , , and . Workshop on Usage Analysis in Learning Systems, Proceedings of Artificial Intelligence in Education, page 33 - 40. Amsterdam, (2005)Investigating performance of students: a longitudinal study., , and . LAK, page 108-112. ACM, (2015)A Data Model to Ease Analysis and Mining of Educational Data., , and . EDM, page 131-140. www.educationaldatamining.org, (2010)Formal Verification as a Design Tool - The Transponder Lock Example., , and . SAFECOMP, page 73-82. Springer, (1996)Learning Analytics: From Big Data to Meaningful Data., , and . J. Learn. Anal., 2 (3): 4-8 (February 2016)Branched Learning Paths for the Recommendation of Personalized Sequences of Course Items., , and . DeLFI Workshops, volume 2250 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)Teacher-Student Classroom Interactions: A Computational Approach., , and . EDM, page 558-559. International Educational Data Mining Society (IEDMS), (2015)Investigating the core group effect in usage of resources with analytics.. LAK, page 230-233. ACM, (2012)Vicinity respecting net morphisms., and . Applications and Theory of Petri Nets, volume 483 of Lecture Notes in Computer Science, page 165-185. Springer, (1989)