Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Energy Storage to Modify the Shape of Internally Generated Demand to Fit a Prescribed Shape for Externally Presented Demand., , , , , , , and . SCC, page 269-272. IEEE, (2018)Quantifying over play: Constraining undesirable solutions in puzzle design., , and . FDG, page 221-228. Society for the Advancement of the Science of Digital Games, (2013)The effects of age on player behavior in educational games., , , , and . FDG, page 158-165. Society for the Advancement of the Science of Digital Games, (2013)Program synthesis as a generative method., , and . FDG, page 6:1-6:10. ACM, (2017)Dragon architect: open design problems for guided learning in a creative computational thinking sandbox game., , and . FDG, page 26:1-26:6. ACM, (2017)Automatic Generation of Problems and Explanations for an Intelligent Algebra Tutor., , , and . AIED (1), volume 11625 of Lecture Notes in Computer Science, page 383-395. Springer, (2019)Automatic Generation of Procedural Knowledge Using Program Synthesis.. University of Washington, USA, (2019)Automatic Game Progression Design through Analysis of Solution Features., , , , and . CHI, page 2407-2416. ACM, (2015)A mixed-initiative tool for designing level progressions in games., , , and . UIST, page 377-386. ACM, (2013)Graph Representation Learning based Vulnerable Target Identification in Ransomware Attacks., , , and . IEEE Big Data, page 2423-2430. IEEE, (2022)