John F. Dooley

According to our database1, John F. Dooley authored at least 35 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Review of A Most Enigmatic War by James Goodchild.
Cryptologia, 2020

Review of the secret world by Christopher Andrew.
Cryptologia, 2020

Review of The Third Reich is Listening by Christian Jennings.
Cryptologia, 2020

2019
Review of 3 Ciphers by Carol Ritz.
Cryptologia, 2019

The Beale ciphers in fiction.
Cryptologia, 2019

The History of the SIGCSE Submission and Review Software: From Paper to the Cloud?
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
History of Cryptography and Cryptanalysis - Codes, Ciphers, and Their Algorithms
History of Computing, Springer, ISBN: 978-3-319-90442-9, 2018

Review of A Mind at Play by Jimmy Soni and Rob Goodman.
Cryptologia, 2018

2017
Peer Instruction in Practice (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Software Development, Design and Coding.
Apress, Inc, ISBN: 9781484231524, 2017

2016
Review of <i>Prisoners, Lovers, & Spies</i> by Kristie Macrakis.
Cryptologia, 2016

Codes, Ciphers and Spies: Tales of Military Intelligence in World War I.
Springer Verlag, ISBN: 3319294148, 2016

2015
Review of <i>George Fabyan</i> by Richard Munson.
Cryptologia, 2015

Curricular Assessment: Tips and Techniques.
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

2014
John Matthews Manly: The <i>Collier's</i> Articles.
Cryptologia, 2014

Review of <i>Mr. Penumbra's 24-Hour Bookstore</i> by Robin Sloan.
Cryptologia, 2014

Review of <i>Inferno</i> by Dan Brown.
Cryptologia, 2014

2013
The SIS and Cipher Machines: 1930-1940.
Proceedings of the 14th Biennial NSA Center for Cryptologic History Symposium., May, 2013

A Brief History of Cryptology and Cryptographic Algorithms.
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-01628-3, 2013

1929-1931: A Transition Period in U.S. Cryptologic History.
Cryptologia, 2013

Making the most of the assessment process.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

2012
Review of <i>Joe Rochefort's War</i> by Elliot Carlson.
Cryptologia, 2012

Review of <i>The Mystic Cipher</i> by Dennis L. Mangrum.
Cryptologia, 2012

2011
Was Herbert O. Yardley a Traitor?
Cryptologia, 2011

2009
Who Wrote <i>The Blonde Countess</i>? A Stylometric Analysis of Herbert O. Yardley's Fiction.
Cryptologia, 2009

Another Yardley Mystery.
Cryptologia, 2009

Peer assessments using the moodle workshop tool.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

2008
A software development course for CC2001: the third time is charming.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

2007
Reviews of Cryptologic Fiction.
Cryptologia, 2007

Experiences with CC2001 at a small college.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

2005
Codes and Ciphers in Fiction: an Overview.
Cryptologia, 2005

2004
Moving to CC2001 at a small college.
Proceedings of the 9th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2004

2003
Software engineering in the liberal arts: combining theory and practice.
ACM SIGCSE Bull., 2003

1994
Creating a Configurable Compiler Driver for System V Release 4.
Proceedings of the USENIX Applications Development Symposium Proceedings 1994, 1994

1988
An artifical intelligence course in a liberal arts program.
ACM SIGCSE Bull., 1988


  Loading...