From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptology in Cyberspace.. Cryptologia, 19 (4): 392-396 (1995)Acting with technology - By Victor Kaptelinin & Bonnie Nardi.. Br. J. Educ. Technol., 39 (1): 184-185 (2008)Key issues in e-learning - By Norbert Pachler & Caroline Daly.. Br. J. Educ. Technol., 43 (3): 100 (2012)Adult learning in the digital age - Selwyn, Neil.. Br. J. Educ. Technol., 37 (4): 652-653 (2006)Technology-mediated narrative environments for learning - Edited by Giuliana Dettori et al.. Br. J. Educ. Technol., 37 (6): 978-979 (2006)CSCL 2005 - By Timothyed Koschmann.. Br. J. Educ. Technol., 38 (6): 1142 (2007)Empirical methods for evaluating educational interventions - Edited by Gary D Phye.. Br. J. Educ. Technol., 38 (2): 378-379 (2007)Superscalar microprocessor design.. Prentice Hall series in innovative technology Prentice Hall, (1991)Action research: models, methods, and examples - Edited by Jerry W Willis and Claudia Edwards.. Br. J. Educ. Technol., 46 (5): 24- (2015)Learning and teaching with technology.. Br. J. Educ. Technol., 36 (4): 702-703 (2005)