Author of the publication

Improving teaching and learning of computer programming through the use of the Second Life virtual world.

, , , and . Br. J. Educ. Technol., 42 (4): 624-637 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BIZZY - A Social Game for Entrepreneurship Education., , , , , , and . HCI (15), volume 8524 of Lecture Notes in Computer Science, page 33-41. Springer, (2014)Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes., , , , , and . IACR Cryptology ePrint Archive, (2017)Stretching the limits of Programmable Embedded Devices for Public-key Cryptography., and . CS2@HiPEAC, page 19-24. ACM, (2015)Exploring the Usage of 3D Virtual Worlds and Kinect Interaction in Exergames with Elderly., , , , , , , and . ICCHP (1), volume 8547 of Lecture Notes in Computer Science, page 297-300. Springer, (2014)Collaboration in 3D Virtual Worlds: a protocol for case study research., , , , and . EAI Endorsed Trans. Future Intellig. Educat. Env., 2 (6): e2 (2016)Assessing organizational stability via network analysis., , and . CIFEr, page 43-50. IEEE, (2009)Simulation model generation for warehouse management: case study to test different storage strategies., , , , , and . Int. J. Simul. Process. Model., 13 (4): 324-336 (2018)Assessment of wizards for eliciting users' accessibility preferences., , , , , , and . DSAI, page 135-140. ACM, (2020)PyLatheDB - A Library for Relational Keyword Search with Support to Schema References., , and . ICDE, page 3627-3630. IEEE, (2023)More efficient, provably-secure direct anonymous attestation from lattices., , , , , , , and . Future Gener. Comput. Syst., (2019)