default search action
Brian R. von Konsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j2]Brian R. von Konsky, Charlynn Miller, Asheley Jones:
The Skills Framework for the Information Age: Engaging Stakeholders in Curriculum Design. J. Inf. Syst. Educ. 27(1): 37-50 (2016) - [c18]Rohini Balapumi, Brian R. von Konsky, Ashley M. Aitken, David A. McMeekin:
Factors influencing university students' self-regulation of learning: an exploratory study. ACSW 2016: 5 - 2014
- [c17]Brian R. von Konsky, Charlynn Miller, Asheley Jones:
Visualising Career Progression for ICT Professionals and the implications for ICT Curriculum Design in Higher Education. ACE 2014: 13-20 - 2011
- [j1]Michael Goldweber, Renzo Davoli, Joyce Currie Little, Charles Riedesel, Henry M. Walker, Gerry W. Cross, Brian R. von Konsky:
Enhancing the social issues components in our computing curriculum: computing for the social good. Inroads 2(1): 64-82 (2011) - [c16]Åsa Cajander, Mats Daniels, Brian R. von Konsky:
Development of professional competencies in engineering education. FIE 2011: S1 - 2010
- [c15]Mikey Goldweber, Joyce Currie Little, Gerry W. Cross, Renzo Davoli, Charles Riedesel, Brian R. von Konsky, Henry M. Walker:
Enhancing the Social Issues Components in our Computing Curriculum: Computing for the Social Good. ITiCSE-WGR 2010: 117-133
2000 – 2009
- 2009
- [c14]David A. McMeekin, Brian R. von Konsky, Michael C. Robey, David J. A. Cooper:
The Significance of Participant Experience when Evaluating Software Inspection Techniques. Australian Software Engineering Conference 2009: 200-209 - [c13]David A. McMeekin, Brian R. von Konsky, Elizabeth Chang, David J. A. Cooper:
Evaluating Software Inspection Cognition Levels Using Bloom's Taxonomy. CSEE&T 2009: 232-239 - [c12]David A. McMeekin, Brian R. von Konsky, Elizabeth Chang, David J. A. Cooper:
Mapping a sequence diagram to the related code: Cognitive levels expressed by developers. INDIN 2009: 283-288 - 2008
- [c11]David A. McMeekin, Brian R. von Konsky, Elizabeth Chang, David J. A. Cooper:
Checklist Based Reading's Influence on a Developer's Understanding. Australian Software Engineering Conference 2008: 489-496 - [c10]David A. McMeekin, Brian R. von Konsky, Elizabeth Chang, David J. A. Cooper:
Checklist Inspections and Modifications: Applying Bloom's Taxonomy to Categorise Developer Comprehension. ICPC 2008: 224-229 - [c9]David A. McMeekin, Brian R. von Konsky, Elizabeth Chang, David J. A. Cooper:
Measuring Cognition Levels in Collaborative Processes for Software Engineering Code Inspections. IT Revolutions 2008: 32-43 - 2007
- [c8]David J. A. Cooper, Brian R. von Konsky, Michael C. Robey, David A. McMeekin:
Obstacles to Comprehension in Usage Based Reading. ASWEC 2007: 233-244 - 2006
- [c7]James Hope, Brian R. von Konsky, Iain Murray, L. C. Chew, B. Farrugia:
A Cisco education tool accessible to the vision impaired. ASSETS 2006: 235-236 - [c6]David J. A. Cooper, Mun Wai Chan, Gautam Mehra, Peter Woodward, Brian R. von Konsky, Michael C. Robey, Michael Harding:
Using Dependence Graphs to Assist Manual and Automated Object Oriented Software Inspections. ASWEC 2006: 262-269 - 2005
- [c5]Brian R. von Konsky, Jim Ivins, Mike Robey:
Using PSP to Evaluate Student Effort in Achieving Learning Outcomes in a Software Engineering Assignment. ACE 2005: 193-201 - [c4]Brian R. von Konsky, Michael C. Robey:
A Case Study: GQM and TSP in a Software Engineering Capstone Project. CSEE&T 2005: 215-222 - 2004
- [c3]David J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey:
Java Implementation Verification Using Reverse Engineering. ACSC 2004: 203-211 - [c2]Brian R. von Konsky, Mike Robey, Sule Nair:
Integrating Design Formalisms in Software Engineering Education. CSEE&T 2004: 78-83 - 2001
- [c1]Leon Blackwell, Brian R. von Konsky, Mike Robey:
Petri Net Script: A Visual Language for Describing Action, Behaviour and Plot. ACSC 2001: 29-37
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-22 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint