The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Richard G. Epstein: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard G. Epstein
    In-depth! The Silicon Valley Sentinel-Observer's public affairs NetTV program presents: toxic knowledge. [Citation Graph (0, 0)][DBLP]
    ACM Policy, 1998, pp:86-91 [Conf]
  2. Richard G. Epstein
    The Use of Computer Ethics Scenarios in Software Engineering Education: The Case of the Killer Robot. [Citation Graph (0, 0)][DBLP]
    CSEE, 1994, pp:429-440 [Conf]
  3. Richard G. Epstein, Robert M. Aiken
    The Information Resource Model. [Citation Graph (0, 0)][DBLP]
    ICCAL, 1989, pp:77-101 [Conf]
  4. Richard G. Epstein
    The play's the thing: ElderCare VR. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2001, pp:428- [Conf]
  5. Richard G. Epstein
    The power of OOPS (abstract): heterogeneous data structures in C++. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1993, pp:311- [Conf]
  6. Richard G. Epstein, Robert M. Aiken, Glenn Snelbecker, Jane Potosky
    Retraining high school teachers to teach computer science - observations on the first course. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1987, pp:136-140 [Conf]
  7. Richard G. Epstein
    An ethics and security course for students in computer science and information technology. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2006, pp:535-537 [Conf]
  8. Richard G. Epstein, Allen B. Tucker
    Introducing object-orientedness into a breadth-first introductory curriculum. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1993, v:4, n:2, pp:293-298 [Journal]
  9. Richard G. Epstein, Deepak Kumar
    Curriculum descant: stories and plays about the ethical and social implications of artificial intelligence. [Citation Graph (0, 0)][DBLP]
    Intelligence, 2000, v:11, n:3, pp:17-19 [Journal]

  10. A Software Engineering Course with an Emphasis on Software Processes and Security. [Citation Graph (, )][DBLP]


  11. Getting Students to Think About How Agile Processes can be Made More Secure. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002