Author of the publication

How PhD students at research universities can prepare for a career at a liberal arts college (abstract only).

, , and . SIGCSE, page 752. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncertainty in Criminal Justice Algorithms: simulation studies of the Pennsylvania Additive Classification Tool., , , and . CoRR, (2021)Analyzing a Carceral Algorithm used by the Pennsylvania Department of Corrections., , , and . CoRR, (2021)Carceral algorithms and the history of control: An analysis of the Pennsylvania additive classification tool., , , and . Big Data Soc., 9 (1): 205395172210940 (January 2022)Analysis of the Pennsylvania Additive Classification Tool: Biases and Important Features., , , and . CoRR, (2021)How PhD students at research universities can prepare for a career at a liberal arts college (abstract only)., , and . SIGCSE, page 752. ACM, (2013)Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs., , and . Allerton, page 223-230. IEEE, (2015)Related-Key Linear Cryptanalysis., and . ISIT, page 1609-1613. IEEE, (2006)Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?, , , and . CHI, page 3833-3837. ACM, (2017)A differentially private estimator for the stochastic Kronecker graph model., and . EDBT/ICDT Workshops, page 167-176. ACM, (2012)Pan-private Algorithms: When Memory Does Not Help, , , and . CoRR, (2010)