Svetlana Peltsverger

According to our database1, Svetlana Peltsverger authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Modeling Women's Elective Choices in Computing.
Proceedings of the 2023 Working Group Reports on Innovation and Technology in Computer Science Education, 2023

A Methodology for Investigating Women's Module Choices in Computer Science.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 2, 2023

2021
Retrieving and Classifying LinkedIn Job Titles for Alumni Career Analysis.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

2019
Adapting the IT2017 Curricula for Two Year Transfer Programs: Determining the Optimal Level of Curricular Guidance.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Instructional Pseudocode Guide to Teach Problem-Solving.
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 2019

2018
Can We Be More Innovative with Program Revision?: Using a Data-Driven 360 Degree Program Review Model.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

2017
IT2017 Report: Putting It to Work.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

The Evolution of the Master of Science in Information Technology Curriculum.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

2016
Enhancing Privacy Education with a Technical Emphasis in IT Curriculum.
J. Inf. Technol. Educ. Innov. Pract., 2016

ACM/IEEE-CS Information Technology Curriculum 2017: A Status Update.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Creating Courses with No Textbook - Pros and Cons: Panel Discussion.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Transforming IT Education with No-Cost Learning Materials.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Career Trajectory Analysis of Information Technology Alumni: A LinkedIn Perspective.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

2015
Updating the ACM/IEEE 2008 Curriculum in Information Technology (Abstract Only).
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015

Multinational Perspectives on Information Technology from Academia and Industry.
Proceedings of the 2015 ITiCSE Working Group Reports, 2015

A survey of university system of Georgia cyber security programs.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2014
Bottleneck analysis with NetKit: teaching information security with hands-on labs.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

2013
Hands-on privacy labs.
Proceedings of the 14th Annual ACM SIGITE Conference on Information Technology Education, 2013

A Virtual Environment for Teaching Technical Aspects of Privacy.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

Minimizing energy consumption in surveillance sensor networks using clusterization.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

2011
Maintaining balance between theory and practice in information security courses.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

The security of cryptographic hashes.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
A Multi-Pass Algorithm for Adjusting a Network Topology in Multipoint Communications.
Int. J. Interdiscip. Telecommun. Netw., 2010

Is teaching with security in mind working?
Proceedings of the Information Security Curriculum Development Conference, 2010

Remotely Accessed Hardware Laboratory Infrastructure.
Proceedings of the 2010 International Conference on Internet Computing, 2010

Controlling connectivity of a clustered mobile communication network.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
Teaching with security in mind.
Proceedings of the 47th Annual Southeast Regional Conference, 2009

2005
Multi-criteria approach in configuration of energy efficient sensor networks.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Allocation of multiple wireless access points in mobile networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004


  Loading...