Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive text analysis of lecture slides to generate concept maps., , and . Comput. Educ., (2017)A survey of Australian teachers' self-efficacy and assessment approaches for the K-12 digital technologies curriculum., and . WiPSCE, page 5:1-5:10. ACM, (2018)Systematic literature review: Self-Regulated Learning strategies using e-learning tools for Computer Science., , and . Comput. Educ., (2018)Parsons Problems usage within a MOOC Pedagogy: (Abstract Only)., , and . SIGCSE, page 1111. ACM, (2018)Assessing and improving the quality of security methodologies for distributed systems., , and . J. Softw. Evol. Process., (2018)Model-driven performance prediction of systems of systems., , , , , , and . Softw. Syst. Model., 17 (2): 415-441 (2018)An adaptive framework for the detection of novel botnets., , and . Comput. Secur., (2018)Designing and supporting collaborative learning activities., and . SIGCSE, page 537-538. ACM, (2013)Educational Question Answering Motivated by Question-Specific Concept Maps., , and . AIED, volume 9112 of Lecture Notes in Computer Science, page 13-22. Springer, (2015)A Comprehensive Pattern-Driven Security Methodology for Distributed Systems., , and . Australian Software Engineering Conference, page 142-151. IEEE Computer Society, (2014)