Elder, C.
60  results:
Search for persons X
?
1

A Scalable Optimization Algorithm for Solving the Beltway a..:

, In: Lecture Notes in Computer Science; Research in Computational Molecular Biology,
Elder, C. S. ; Hoang, Minh ; Ferdosi, Mohsen. - p. 201-216 , 2024
 
?
2

MitoMut : An Efficient Approach to Detecting Mitochondri..:

, In: Proceedings of the 10th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics,
Elder, C. Shane ; Welsh, Catherine E. - p. 177-182 , 2019
 
?
 
?
4

The Future of Inclusive Education:

, In: The Future of Inclusive Education,
 
?
5

Learning from the Global South: What Inclusive Education in..:

, In: The Future of Inclusive Education,
Elder, Brent C. - p. 53-80 , 2023
 
?
7

The Experiences of Deaf New Americans Accessing Education i..:

, In: The Future of Inclusive Education,
Elder, Brent C. - p. 117-143 , 2023
 
?
8

Bridging Theory to Practice: Building Research Self-Efficac..:

, In: Research Anthology on Doctoral Student Professional Development,
 
?
9

Discipline-Focused Revision Practices: A Context-Specific E..:

, In: Research Anthology on Doctoral Student Professional Development,
Crain-Dorough, Mindy ; Elder, Adam C. - p. 515-537 , 2022
 
?
10

Flipping Statistics Education: Building Research Self-Effic..:

, In: Reshaping Graduate Education Through Innovation and Experiential Learning; Advances in Higher Education and Professional Development,
Elder, Adam C. ; Crain-Dorough, Mindy - p. 130-146 , 2021
 
?
11

Bridging Theory to Practice: Building Research Self-Efficac..:

, In: Handbook of Research on Developing Students' Scholarly Dispositions in Higher Education; Advances in Higher Education and Professional Development,
 
?
12

NICE : endpoint-based topology discovery:

, In: Proceedings of the 9th Annual Cyber and Information Security Research Conference,
 
?
13

External monitoring of endpoint configuration compliance:

, In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies,
 
?
14

Quand le grand public adopte la contre-culture:

, In: Fabriqué au Canada,
Elder, Alan.C - p. 106-116 , 2005
 
1-15