Author of the publication

Young women in computing: lessons learned from an educational & outreach program.

, , , and . SIGCSE, page 509-513. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating Answer Sets of Unitary Lifschitz-Woo Programs., , and . LPNMR, volume 3662 of Lecture Notes in Computer Science, page 66-78. Springer, (2005)Proactively applied encryption in multipath networks., , , and . Comput. Secur., (2016)Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks., , , and . MILCOM, page 88-93. IEEE, (2014)Minimality of a solution update in conflict resolution: An application of revision programming to the von Neumann-Morgenstern approach., and . Int. J. Intell. Syst., 20 (9): 939-956 (2005)Historical sources as a teaching tool., , and . SIGCSE, page 401-402. ACM, (2009)Peer learning assistants in undergraduate computer science courses.. FIE, page 1-4. IEEE Computer Society, (2016)Revision Programming = Logic Programming + Integrity Constraints., , and . CSL, volume 1584 of Lecture Notes in Computer Science, page 73-89. Springer, (1998)Annotated revision programs, , and . CoRR, (2001)Annotated Revision Programs., , and . LPNMR, volume 1730 of Lecture Notes in Computer Science, page 49-62. Springer, (1999)A project in algorithms based on a primary historical source about catalan numbers., , , and . SIGCSE, page 318-322. ACM, (2006)