Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nifty Assignments., , , , , , , , , and 3 other author(s). SIGCSE (2), page 1067-1068. ACM, (2022)Decision Support for Combining Security Mechanisms using Exploratory Evolutionary Testing., and . ICTAI, page 550-557. IEEE, (2020)Using Exploratory Testing for Decision Support in Choosing a Security Mechanism., and . CEC, page 2236-2243. IEEE, (2019)A Chatbot Won't Judge Me: An Exploratory Study of Self-disclosing Chatbots in Introductory Computer Science Classes., , , and . WCCCE, page 9:1-9:7. ACM, (2024)Evaluating the Emergent Effects of (Multiple) Security Mechanisms via Evolutionary Algorithms.. University of Calgary, Alberta, Canada, (2018)base-search.net (ftunivcalgary:oai:prism.ucalgary.ca:1880/109218).Predicting device performance from pass/fail transient signal analysis data., , , , and . ITC, page 1070-1079. IEEE Computer Society, (2000)Underway path-planning for an unmanned surface vehicle performing cooperative navigation for UUVs at varying depths., and . IROS, page 2298-2305. IEEE, (2014)Three-Dimensional Path-Planning for a Communications and Navigation Aid Working Cooperatively with Autonomous Underwater Vehicles., , and . AIS, volume 6752 of Lecture Notes in Computer Science, page 51-62. Springer, (2011)