From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Companies proactively seek out internal threats.. Commun. ACM, 58 (11): 15-17 (2015)Broadening the path for women in STEM.. Commun. ACM, 61 (8): 19-21 (2018)Hiring from the autism spectrum.. Commun. ACM, 63 (6): 17-19 (2020)Saving Digital Libraries and the Internet Archive.. Commun. ACM, 66 (12): 11-12 (декабря 2023)Converting laws to programs.. Commun. ACM, 65 (1): 15-16 (2022)The dangers of automating social programs.. Commun. ACM, 61 (10): 17-19 (2018)Should everybody learn to code?. Commun. ACM, 57 (2): 16-18 (2014)Ephemeral data.. Commun. ACM, 56 (9): 20-22 (2013)How universities deploy student data.. Commun. ACM, 63 (4): 18-20 (2020)A battery-free internet of things.. Commun. ACM, 64 (7): 16-18 (2021)