Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metaoptimization of the in-lining priority function for a compiler targeting a polymorphous computing architecture.. GECCO (Companion), page 1921-1928. ACM, (2008)Design and Implementation of a Minuscule General Purpose Processor in an Undergraduate Computer Architecture Course., , and . MSE, page 43-44. IEEE Computer Society, (2007)Management challenges in a large introductory computer science course., and . SIGCSE, page 252-256. ACM, (2002)Measuring the effectiveness of robots in teaching computer science., and . SIGCSE, page 307-311. ACM, (2003)Proposed Cybersecurity Merit Badge for the Boy Scouts of America: (Abstract Only)., , , and . SIGCSE, page 1085. ACM, (2018)Polypeptide structure prediction: real-value versus binary hybrid genetic algorithms., , , , and . SAC, page 279-286. ACM, (1997)Cyberspace Odyssey: A Competitive Team-Oriented Serious Game in Computer Networking., , , , , , , and . IEEE Trans. Learn. Technol., 13 (3): 502-515 (2020)Underwater Hacker Missile Wars: A Cryptography and Engineering Contest., , , and . Cryptologia, 30 (1): 69-77 (2006)Design optimization for a novel class of high power microwave sources., and . IEEE Congress on Evolutionary Computation, page 1732-1739. IEEE, (2003)Hybrid genetic algorithms for polypeptide energy minimization., , , , and . SAC, page 305-311. ACM, (1996)