David Joyner

Orcid: 0000-0002-4789-5679

According to our database1, David Joyner authored at least 30 papers between 1998 and 2025.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
AI Enhanced Intelligent Texts and Learning Gains.
Proceedings of the Sixth International Workshop on Intelligent Textbooks 2025 co-located with the 26th International Conference on Artificial Intelligence in Education (AIED 2025), 2025

Using Sentiment Analysis to Investigate Peer Feedback by Native and Non-Native English Speakers.
Proceedings of the ACM Global on Computing Education Conference 2025 Vol 1, 2025

2024
When Chatting Isn't Cheating: Mining and Evaluating Student Use of Chatbots and Other Resources During Open-Internet Exams.
Proceedings of the 17th International Conference on Educational Data Mining, 2024


Using Intelligent Texts in a Computer Science Classroom: Findings from an iTELL Deployment.
Proceedings of 8th Educational Data Mining in Computer Science Education Workshop (CSEDM 2024) co-located with the 17th Educational Data Mining Conference (EDM 2024), 2024

2018
Review of A Life in Code by Stuart G. Smith and The Woman Who Smashed Codes by Jason Fagone.
Cryptologia, 2018

2016
Cryptographic properties of monotone Boolean functions.
J. Math. Cryptol., 2016

Edge-weighted Cayley Graphs and p-ary Bent Functions.
Integers, 2016

2015
Edge-weighted Cayley graphs, monotonicity and bent functions.
ACM Commun. Comput. Algebra, 2015

2013
Review of <i>Cryptographic Boolean Functions and Applications</i> by Thomas Cusick and Pantelimon Stănică.
Cryptologia, 2013

Review of <i>Algebraic Shift Register Sequences</i> by Mark Goresky and Andrew Klapper.
Cryptologia, 2013

2012
Lester Hill's Error-Detecting Codes.
Cryptologia, 2012

2011
Open source computer algebra systems: SymPy.
ACM Commun. Comput. Algebra, 2011

2010
Codes from Riemann-Roch spaces for y<sup>2</sup> = x<sup>p</sup> - x over GF(p).
Int. J. Inf. Coding Theory, 2010

2009
Review of <i>Algorithmic Number Theory: Lattices, Curves and Cryptography</i>, Edited by J. P. Buhler and P. Stevenhagen.
Cryptologia, 2009

Open source computer algebra systems: GAP.
ACM Commun. Comput. Algebra, 2009

AMS special session on SAGE and mathematical research using open source software.
ACM Commun. Comput. Algebra, 2009

2008
On Quadratic Residue Codes and Hyperelliptic Curves.
Discret. Math. Theor. Comput. Sci., 2008

SAGE and coding theory (abstract only).
ACM Commun. Comput. Algebra, 2008

Open source computer algebra systems: Axiom.
ACM Commun. Comput. Algebra, 2008

2007
Computing with toric varieties.
J. Symb. Comput., 2007

Review of Authentication Codes and Combinatorial Designs by Dingyi Pei.
Cryptologia, 2007

2006
Automorphism Groups of Some AG Codes.
IEEE Trans. Inf. Theory, 2006

Edited Transcript of Interview with Peter Hilton for "Secrets of War".
Cryptologia, 2006

OSCAS: maxima.
ACM Commun. Comput. Algebra, 2006

2005
SAGE: system for algebra and geometry experimentation.
SIGSAM Bull., 2005

GUAVA: an error-correcting codes package.
SIGSAM Bull., 2005

Conjectural permutation decoding of some AG codes.
SIGSAM Bull., 2005

2004
Toric Codes over Finite Fields.
Appl. Algebra Eng. Commun. Comput., 2004

1998
A Maple package for the decomposition of certain tensor products and restrictions of representations using crystal graphs.
SIGSAM Bull., 1998


  Loading...