Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systems design of cybersecurity in embedded systems., , , , , , , , , and . HPEC, page 1-6. IEEE, (2016)Designing agility and resilience into embedded systems., , , , , , , , , and 2 other author(s). MILCOM, page 249-254. IEEE, (2017)An autonomic failure-detection algorithm., , , , and . WOSP, page 79-83. ACM, (2004)Transition Resilience with ICTs: 'Identity Awareness' in Veteran Re-Integration., , and . CHI, page 2882-2894. ACM, (2016)Military Masculinity and the Travails of Transitioning: Disclosure in Social Media., , and . CSCW, page 387-403. ACM, (2017)Insertable Digital Devices: Voluntarily Under the Skin., , , , and . Conference on Designing Interactive Systems (Companion Volume), page 85-88. ACM, (2016)Translation in Personal Crises: Opportunities for Wearables Design., , , , and . ISCRAM, ISCRAM Association, (2017)Circuit Implementation of a 300-MHz 64-bit Second-generation CMOS Alpha CPU, , , , , , , , , and 11 other author(s). Digit. Tech. J., (1995)Manifesting the Cyborg via Techno Body Modification: From Human Computer Interaction to Integration.. CSCW Companion, page 53-56. ACM, (2017)Manifesting the Cyborg through Techno-Body Modification: From Human-Computer Interaction to Integration., and . CHI, page 2499-2510. ACM, (2017)