Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the completeness of reference transactions in online chats. Results of an unobtrusive study. Reference and User Services Quarterly, 44 (1): 46--56 (2004)Technology on demand: Implementing loanable technology services at the University of Illinois at Urbana-Champaign., , , and . Library Hi Tech, 29 (1): 34-50 (2011)Security Requirements for BGP Path Validation., , and . RFC, (August 2014)Designing internet research assignments: building a framework for instructor collaboration., and . Inf. Res., (2000)Guidelines for the development of automotive software.. Softw. Eng. J., 11 (2): 76-81 (1996)Trust building and the European Reference Network for Critical Infrastructure Protection community., , , and . Int. J. Crit. Infrastructure Prot., 7 (3): 193-210 (2014)Verification and validation of neural networks for safety-critical applications., , and . ACC, page 4789-4794. IEEE, (2002)Use cases and deployment of Juniper's high-end programmable routers.. PRESTO@CoNEXT, page 4:1. ACM, (2010)Optimal Remote Estimation Over Use-Dependent Packet-Drop Channels - Extended Version., and . CoRR, (2016)A Content-Addressable DNA Database with Learned Sequence Encodings., , , , , , and . DNA, volume 11145 of Lecture Notes in Computer Science, page 55-70. Springer, (2018)