Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Behavioral Approach to Information Security Policy Compliance., and . AMCIS, Association for Information Systems, (2017)Business-Driven Information Systems Change: Establishing an Alternate Lens for Understanding the Change Process., and . AMCIS, Association for Information Systems, (2017)Learning Rich Features from RGB-D Images for Object Detection and Segmentation., , , and . CoRR, (2014)Unifying Map and Landmark Based Representations for Visual Navigation., , , and . CoRR, (2017)Effective Running of End-to-End HPC Workflows on Emerging Heterogeneous Architectures., , , , and . CLUSTER, page 344-348. IEEE Computer Society, (2017)Spatial Locality-Aware Cache Partitioning for Effective Cache Sharing., and . ICPP, page 150-159. IEEE Computer Society, (2015)Do I matter?: the impact of individual differences on training process., , and . CPR, page 112-120. ACM, (2010)Cognitive Mapping and Planning for Visual Navigation., , , , and . CVPR, page 7272-7281. IEEE Computer Society, (2017)End-user training methods: what we know, need to know., , and . DATA BASE, 41 (4): 9-39 (2010)Failures in large scale systems: long-term measurement, analysis, and implications., , , and . SC, page 44:1-44:12. ACM, (2017)