Author of the publication

Blinded by Science?: Exploring Affective Meaning in Students' Own Words.

, , , , , , and . ITS, volume 9684 of Lecture Notes in Computer Science, page 314-319. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Informing the Utility of Learning Interventions: Investigating Factors Related to Students' Academic Achievement in Classroom and Online Courses., and . AIED (2), volume 11626 of Lecture Notes in Computer Science, page 286-291. Springer, (2019)Preparation, detection, and analysis: the diagnostic work of IT security incident response., , , and . Inf. Manag. Comput. Secur., 18 (1): 26-42 (2010)Measuring Creative Ability in Spoken Bilingual Text: The Role of Language Proficiency and Linguistic Features., , , and . CogSci, page 1056-1062. cognitivesciencesociety.org, (2019)Scanpaths distinguish problem format in a math cognition task., , and . CogSci, cognitivesciencesociety.org, (2020)Evaluating a Decision-Theoretic Approach to Tailored Example Selection., and . IJCAI, page 483-488. (2007)Sensors Model Student Self Concept in the Classroom., , , , , and . UMAP, volume 5535 of Lecture Notes in Computer Science, page 30-41. Springer, (2009)Exploring Eye Tracking to Increase Bandwidth in User Modeling., , , and . User Modeling, volume 3538 of Lecture Notes in Computer Science, page 357-366. Springer, (2005)"Yes!": Using Tutor and Sensor Data to Predict Moments of Delight during Instructional Activities., , and . UMAP, volume 6075 of Lecture Notes in Computer Science, page 159-170. Springer, (2010)An Analysis of Gaming Behaviors in an Intelligent Tutoring System., , , and . Intelligent Tutoring Systems (1), volume 6094 of Lecture Notes in Computer Science, page 184-193. Springer, (2010)Toward understanding distributed cognition in IT security management: the role of cues and norms., , , and . Cogn. Technol. Work., 13 (2): 121-134 (2011)