Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for the Relaxed Online Bin-Packing Model., , and . SIAM J. Comput., 30 (5): 1532-1551 (2000)On Locally Presented Posets., , and . Theor. Comput. Sci., 70 (2): 251-260 (1990)Competitive Algorithms for the On-line Traveling Salesman., , , , and . WADS, volume 955 of Lecture Notes in Computer Science, page 206-217. Springer, (1995)Experiences and issues in the realization of e-government services., , , and . RIDE, page 143-. IEEE Computer Society, (2002)Movement based biometric authentication with smartphones., , , and . ICCST, page 235-239. IEEE, (2015)Providing online operational support for distributed, security sensitive electronic business processes., , , and . ICCST, page 49-54. IEEE, (2015)Requirements and Design Issues of Spatial Data Handling Systems., , , and . CISM - Advances in Database Systems, volume 347 of CISM International Centre for Mechanical Sciences - Courses and Lectures, page 49-69. Springer, (1993)Access Keys Warehouse: A New Approach to the Development of Cooperative Information Systems., , , , and . CoopIS, page 46-56. IEEE Computer Society, (1999)Keeping coherence among web sources., , , and . WIDM, page 16-23. ACM, (2001)Towards a seamless digital Europe: the SSEDIC recommendations on digital identity management., , , , and . Open Identity Summit, volume P-237 of LNI, page 62-72. GI, (2014)