


default search action
Deepti Joshi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c16]Deepti Joshi
, Candace Joswick
, Jennifer L. Albert
, Robin Jocius
, Melanie Blanton
, Robert Petrulis
, Trent Dawson
:
Assessing Elementary Teachers' Knowledge of Integrated Computational Thinking. SIGCSE (2) 2025: 1501-1502 - 2024
- [j15]Robin Jocius
, Jennifer L. Albert, Ian O'Byrne, Deepti Joshi, Richard Robinson, Melanie Blanton:
Computational thinking infusion as transformative teaching: investigating content area teacher perspectives and practices. Comput. Sci. Educ. 34(2): 222-251 (2024) - [j14]Praval Sharma
, Ashok Samal
, Leen-Kiat Soh
, Deepti Joshi
:
A Spatially-Aware Data-Driven Approach to Automatically Geocoding Non-Gazetteer Place Names. ACM Trans. Spatial Algorithms Syst. 10(1): 1:1-1:34 (2024) - [c15]Dalton J. Hazelwood, Deepti Joshi, Ashok Samal, Leen-Kiat Soh:
Discovering Localized Drivers of Unrest Events using Clustering and XGBoost. IEEE Big Data 2024: 2958-2966 - [c14]Jacob Wood, Deepti Joshi:
Conflict-RAG: Understanding Evolving Conflicts Using Large Language Models. IEEE Big Data 2024: 5459-5467 - [c13]Arpit Sharma, Deepti Joshi, William H. Money, Denise Mcwilliams:
The Effectiveness of Fitness Wearable Technologies: Applying Big-Data Techniques to Analyze User Experience and Perception. HICSS 2024: 834-843 - [c12]Jennifer L. Albert
, Candace Joswick
, Deepti Joshi
, Robin Jocius
, Melanie Blanton
, Robert Petrulis
:
Elementary Teachers Engaging with Learning Trajectories to Create Professional Learning Goals around Computer Science Integration. SIGCSE (2) 2024: 1554-1555 - 2023
- [j13]Praval Sharma
, Ashok Samal, Leen-Kiat Soh, Deepti Joshi:
A spatially-aware algorithm for location extraction from structured documents. GeoInformatica 27(4): 645-679 (2023) - [j12]Anup Adhikari
, Leen-Kiat Soh
, Deepti Joshi
, Ashok Samal
, Regina Werum
:
Agent Based Modeling of the Spread of Social Unrest Using Infectious Disease Models. ACM Trans. Spatial Algorithms Syst. 9(3): 17:1-17:31 (2023) - [c11]Deepti Joshi
, Robin Jocius
, Melanie Blanton
, Jennifer L. Albert
, Ian O'Byrne
:
Project Sustainability through Teacher Autonomy in CT Infusion. SIGCSE (2) 2023: 1387 - 2021
- [j11]Yashwant Kurmi
, Vijayshri Chaurasia
, Aditya Goel
, Deepti Joshi
, Neelkamal Kapoor:
Tuberculosis bacteria analysis in acid fast stained images of sputum smear. Signal Image Video Process. 15(1): 175-183 (2021) - [c10]Robin Jocius, Deepti Joshi, Jennifer L. Albert, Tiffany Barnes, Richard Robinson, Veronica Cateté
, Yihuan Dong, Melanie Blanton, Ian O'Byrne, Ashley Andrews:
The Virtual Pivot: Transitioning Computational Thinking PD for Middle and High School Content Area Teachers. SIGCSE 2021: 1198-1204 - 2020
- [c9]Robin Jocius, Deepti Joshi, Yihuan Dong, Richard Robinson, Veronica Cateté
, Tiffany Barnes, Jennifer L. Albert, Ashley Andrews, Nicholas Lytle:
Code, Connect, Create: The 3C Professional Development Model to Support Computational Thinking Infusion. SIGCSE 2020: 971-977
2010 – 2019
- 2019
- [j10]Nathaniel Ballard, Deepti Joshi:
Similarity matching in news articles. J. Comput. Sci. Coll. 35(4): 46-51 (2019) - [j9]Timothy Clark, Deepti Joshi:
Detecting areas of social unrest through natural language processing on social media. J. Comput. Sci. Coll. 35(4): 68-73 (2019) - [j8]Adrian Beaput, Shankar M. Banik, Deepti Joshi:
Ranking privacy of the users in the cyberspace. J. Comput. Sci. Coll. 35(4): 109-114 (2019) - [c8]Yihuan Dong, Veronica Cateté
, Nicholas Lytle
, Amy Isvik
, Tiffany Barnes, Robin Jocius, Jennifer L. Albert
, Deepti Joshi, Richard Robinson, Ashley Andrews:
Infusing Computing: Analyzing Teacher Programming Products in K-12 Computational Thinking Professional Development. ITiCSE 2019: 278-284 - [c7]Yihuan Dong, Veronica Cateté
, Robin Jocius, Nicholas Lytle
, Tiffany Barnes, Jennifer L. Albert, Deepti Joshi, Richard Robinson, Ashley Andrews:
PRADA: A Practical Model for Integrating Computational Thinking in K-12 Education. SIGCSE 2019: 906-912 - 2018
- [c6]Sudeep Basnet, Leen-Kiat Soh, Ashok Samal, Deepti Joshi
:
Analysis of Multifactorial Social Unrest Events with Spatio-Temporal k-Dimensional Tree-based DBSCAN. LENS@SIGSPATIAL 2018: 2:1-2:10 - 2017
- [c5]Deepti Joshi
, Sudeep Basnet, Hariharan Arunachalam, Leen-Kiat Soh, Ashok Samal, Shawn Ratcliff, Regina Werum:
SURGE: Social Unrest Reconnaissance GazEteer. SIGSPATIAL/GIS 2017: 94:1-94:4 - 2016
- [j7]Newton McCollum, Andrew Fayed, Benjamin McIntosh, James Carignan, Deepti Joshi:
Using TWIG: India's past versus present via topic modeling. J. Comput. Sci. Coll. 32(2): 142-148 (2016) - [j6]Michael P. Verdicchio, Deepti Joshi, Shankar M. Banik:
Embedding cybersecurity in the second programming course (CS2). J. Comput. Sci. Coll. 32(2): 165-171 (2016) - [j5]Christopher Landry, Deepti Joshi, Shankar M. Banik:
Discovering user information by aggregating social media data: poster session. J. Comput. Sci. Coll. 32(2): 205-207 (2016) - 2015
- [c4]Jonathon Ng, Deepti Joshi
, Shankar M. Banik:
Applying Data Mining Techniques to Intrusion Detection. ITNG 2015: 800-801 - 2014
- [j4]Deepti Joshi
, Leen-Kiat Soh, Ashok Samal, Jing Zhang:
A dissimilarity function for geospatial polygons. Knowl. Inf. Syst. 41(1): 153-188 (2014) - 2013
- [j3]Deepti Joshi
, Ashok Samal, Leen-Kiat Soh:
Spatio-temporal polygonal clustering with space and time as first-class citizens. GeoInformatica 17(2): 387-412 (2013) - 2012
- [j2]Deepti Joshi
, Leen-Kiat Soh, Ashok Samal:
Redistricting Using Constrained Polygonal Clustering. IEEE Trans. Knowl. Data Eng. 24(11): 2065-2079 (2012)
2000 – 2009
- 2009
- [c3]Deepti Joshi
, Ashok Samal, Leen-Kiat Soh:
Density-based clustering of polygons. CIDM 2009: 171-178 - [c2]Deepti Joshi, Ashok Samal, Leen-Kiat Soh:
A dissimilarity function for clustering geospatial polygons. GIS 2009: 384-387 - [c1]Deepti Joshi
, Leen-Kiat Soh, Ashok Samal:
Redistricting Using Heuristic-Based Polygonal Clustering. ICDM 2009: 830-835 - 2005
- [j1]Deepti Joshi, Kamesh Namuduri
, Ravi Pendse:
Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis. EURASIP J. Wirel. Commun. Netw. 2005(4): 579-589 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 21:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint