共 15 条
[1]
Denny Paul, 2008, P 4 INT WORKSH COMP, P113, DOI [10.1145/1404520.1404532, DOI 10.1145/1404520.1404532]
[2]
Dong Y., 2017, 13 ART INT INT DIG E
[3]
Garcia Dan, 2015, ACM Inroads, V6, P71
[4]
Mastery Learning in Computer Science Education
[J].
PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTING EDUCATION CONFERENCE (ACE 2019),
2019,
:37-46
[5]
Hedegaard Mariane, 2002, INTRO VYGOTSKY, P183, DOI DOI 10.4324/9780203434185-13
[6]
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
[J].
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2010,
:44-56
[7]
Lytle, 2019, P 24 ANN C INN TECHN
[8]
CEO: A Triangulated Evaluation of a Modeling-Based CT-Infused CS Activity for Non-CS Middle Grade Students
[J].
PROCEEDINGS OF THE ACM CONFERENCE ON GLOBAL COMPUTING EDUCATION (COMPED '19),
2019,
:58-64
[9]
Nakamura J., 2009, Handb. Posit. Psychol., VVolume 195, P195, DOI [10.1093/oxfordhb/9780195187243.013.0018, DOI 10.1093/OXFORDHB/9780195187243.013.0018, 10.1093/oxfordhb/9780195187243.013.0018.2009]
[10]
Price Thomas W, 2017, EDM