Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workshop on graphical documentation for programmers., and . SIGDOC, page 234-235. ACM, (2002)Tracing Forum Posts to MOOC Content using Topic Analysis., , and . CoRR, (2019)Looking at Code With Your Safety Goggles On.. Ada-Europe, volume 1411 of Lecture Notes in Computer Science, page 251-262. Springer, (1998)On Integrating Visualization Techniques for Effective Software Exploration, , , and . Intl Conf. on Information Visualization, page 38--45. Phoenix, AZ, (1997)Operational experience with a virtual networking laboratory., , , and . SIGCSE, page 427-431. ACM, (2008)Report from the 3rd International Symposium on Software Engineering Course Projects (SWECP 2006)., , and . CSEE&T, page 237-246. IEEE Computer Society, (2007)On the effect of subliminal priming on subjective perception of images: A machine learning approach., , , , , , , , and . EMBC, page 5438-5441. IEEE, (2014)Refinement of Safety-Related Hazards into Verifiable Code Assertions., and . SAFECOMP, volume 1516 of Lecture Notes in Computer Science, page 345-358. Springer, (1998)Root cause analysis and diagnosis in SOA and cloud environments., , , and . CASCON, page 335-336. ACM, (2009)The risk involved in computerisation what can go wrong.. Comput. Law Secur. Rev., 1 (5): 12-13 (1986)