default search action
Keith Irwin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c35]Darina Dicheva, Lillian N. Cassel, Robert Styer, Christo Dichev, Breonte Guy, Keith Irwin:
An Empirical Study of the Effects of Virtual Currency on Learners in Out of Class Practicing. EC-TEL 2022: 74-87 - [c34]Darina Dicheva, Keith Irwin, Christo Dichev, Lillian (Boots) Cassel, Rita Ismailova:
How to Gamify Computer Science Courses? SIGCSE (2) 2022: 1188 - 2021
- [c33]Darina Dicheva, Breonte Guy, Vassil Yorgov, Christo Dichev, Keith Irwin, Charles F. Mickle:
A Study of Using Virtual Currency in a Discrete Mathematics Course. EDUCON 2021: 567-576 - [c32]Darina Dicheva, Christo Dichev, Lillian N. Cassel, Breonte Guy, Keith Irwin:
Exploring the Impact of Non-conventional Gamification Elements on Student Motivation and Engagement. FIE 2021: 1-9 - [c31]Darina Dicheva, Wen-Jung Hsin, Christo Dichev, Breonte Guy, Lillian N. Cassel, Keith Irwin:
Exploring the Effect of Virtual Currency on Learners Engagement. ICALT 2021: 83-87 - [c30]Darina Dicheva, Keith Irwin, Lillian N. Cassel:
How to Gamify Your Computing Classes. SIGCSE 2021: 1350 - 2020
- [c29]Darina Dicheva, Keith Irwin, Austin Hodge, Christo Dichev, Lillian N. Cassel:
Gamifying Computer Science Courses with OneUp Learning. SIGCSE 2020: 1391
2010 – 2019
- 2019
- [j2]Darina Dicheva, Keith Irwin, Christo Dichev:
Exploring Learners Experience of Gamified Practicing: For Learning or for Fun? Int. J. Serious Games 6(3): 5-21 (2019) - [c28]Lillian N. Cassel, Darina Dicheva, Christo Dichev, Breonte Guy, Keith Irwin:
Student Motivation and Engagement in STEM Courses: Exploring the Potential Impact of Gamification. ITiCSE 2019: 299 - [c27]Debzani Deb, M. Muztaba Fuad, Keith Irwin:
A Module-based Approach to Teaching Big data and Cloud Computing Topics at CS Undergraduate Level. SIGCSE 2019: 2-8 - [c26]Darina Dicheva, Keith Irwin, Christo Dichev:
OneUp: Engaging Students in a Gamified Data Structures Course. SIGCSE 2019: 386-392 - [c25]Darina Dicheva, Christo Dichev, Keith Irwin, Elva J. Jones, Lillian (Boots) Cassel, Peter J. Clarke:
Can Game Elements Make Computer Science Courses More Attractive? SIGCSE 2019: 1245 - [c24]Keith Irwin, Austin Hodge, Darina Dicheva:
Gamifying Computer Science Courses with OneUp. SIGCSE 2019: 1289 - [c23]Christo Dichev, Darina Dicheva, Keith Irwin:
Towards Activity-Centered Gamification Design. TALE 2019: 1-9 - 2018
- [j1]Darina Dicheva, Keith Irwin, Christo Dichev:
OneUp: Supporting Practical and Experimental Gamification of Learning. Int. J. Serious Games 5(3): 5-21 (2018) - [c22]Darina Dicheva, Keith Irwin, Christo Dichev:
Gamifying with OneUp: For Learning, Grades or Fun? GALA 2018: 343-353 - [c21]Darina Dicheva, Keith Irwin, Christo Dichev:
Motivational Factors in Educational Gamification. ICALT 2018: 408-410 - [c20]Keith Irwin:
Redesigning Secure Protocols to Compel Grammatical Compliance Checking. IEEE Symposium on Security and Privacy Workshops 2018: 299-305 - 2017
- [c19]Darina Dicheva, Keith Irwin, Christo Dichev:
OneUp Learning: A Course Gamification Platform. GALA 2017: 148-158 - [c18]Keith Irwin, Darina Dicheva, Christo Dichev:
Open Extensible System for Dynamic Problem Creation for Computer Science (Abstract Only). SIGCSE 2017: 710 - 2016
- [c17]Darina Dicheva, Austin Hodge, Christo Dichev, Keith Irwin:
On the design of an educational game for a Data Structures course. TALE 2016: 14-17 - 2015
- [c16]Keith Irwin:
Redesigning Secure Protocols to Compel Security Checks. Security Protocols Workshop 2015: 22-29 - [c15]Keith Irwin:
Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion). Security Protocols Workshop 2015: 30-40 - 2012
- [c14]Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu:
Ensuring authorization privileges for cascading user obligations. SACMAT 2012: 33-44 - 2011
- [c13]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
On the management of user obligations. SACMAT 2011: 175-184 - 2010
- [c12]Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
Toward practical authorization-dependent user obligation systems. AsiaCCS 2010: 180-191 - [c11]Elijah Myers, Paul S. Fisher, Keith Irwin, Jinsuk Baek, João C. Setubal:
The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings. PRIB 2010: 125-136 - [c10]Murillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, Ting Yu:
Failure Feedback for User Obligation Systems. SocialCom/PASSAT 2010: 713-720
2000 – 2009
- 2008
- [c9]Keith Irwin, Ting Yu, William H. Winsborough:
Assigning Responsibility for Failed Obligations. IFIPTM 2008: 327-342 - [c8]Keith Irwin, Ting Yu, William H. Winsborough:
Enforcing security properties in task-based systems. SACMAT 2008: 41-50 - [c7]Keith Irwin, Ting Yu, William H. Winsborough:
Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 - 2007
- [c6]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - 2006
- [c5]Keith Irwin, Ting Yu, William H. Winsborough:
On the modeling and analysis of obligations. CCS 2006: 134-143 - 2005
- [c4]Keith Irwin, Ting Yu:
Preventing attribute information leakage in automated trust negotiation. CCS 2005: 36-45 - [c3]Keith Irwin, Ting Yu:
Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50 - 2004
- [c2]Mazen Kharbutli, Keith Irwin, Yan Solihin, Jaejin Lee:
Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses. HPCA 2004: 288-299 - [c1]Keith Irwin, Ting Yu:
An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint