Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hour of code: what you did.. ACM SIGCSE Bull., 48 (1): 2-3 (2016)Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications., , , and . ESSoS, volume 5965 of Lecture Notes in Computer Science, page 61-69. Springer, (2010)SAVI: Static-Analysis Vulnerability Indicator., and . IEEE Secur. Priv., 10 (3): 32-39 (2012)An informatics perspective on computational thinking., , , and . ITiCSE, page 4-9. ACM, (2013)SIGCSE Technical Symposium 2023: Information for Attendees., , , , , , and . ACM SIGCSE Bull., 55 (1): 2-4 (January 2023)SIGCSE Technical Symposium 2023: Call for Participation., and . ACM SIGCSE Bull., 54 (4): 4-5 (2022)Work in progress - Does maintenance first improve student's understanding and appreciation of clean code and documentation., , , and . FIE, page 4. IEEE Computer Society, (2011)Security of open source web applications., , , and . ESEM, page 545-553. IEEE Computer Society, (2009)Increasing awareness of computer science in high school girls., , , , and . FIE, page 1-8. IEEE Computer Society, (2014)Computing Competencies for Undergraduate Data Science Programs: an ACM Task Force Final Report., , , , , , , and . SIGCSE, page 1119-1120. ACM, (2021)