Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating risks of digitalization through managed industrial security services., and . AI Soc., 33 (2): 163-173 (2018)Reinforcement Learning for Manipulators without Direct Obstacle Perception in Physically Constrained Environments, , , and . Procedia Manufacturing, (2017)Introductory mathematics computer course., , and . EDUCON, page 1-4. IEEE, (2012)OPC UA Based ERP Agents: Enabling Scalable Communication Solutions in Heterogeneous Automation Environments., , and . PAAMS, volume 10349 of Lecture Notes in Computer Science, page 120-131. Springer, (2017)Networked experiments and scientific resource sharing in cooperative knowledge spaces., , , , and . Interact. Technol. Smart Educ., 4 (1): 19-30 (2007)Integrative Knowledge Management in Interdisciplinary Research Clusters., , , , and . iJAC, 8 (3): 17-22 (2015)Individualization and Flexibility through Computer Algebra Systems in Virtual Laboratories., and . ISM, page 965-970. IEEE Computer Society, (2006)Networking Resources for Research and Scientific Education in BW-eLabs., , , , , , , , , and 3 other author(s). SNPD, page 47-52. IEEE Computer Society, (2009)Exploring Research Networks with Data Science: A Data-Driven Microservice Architecture for Synergy Detection., , , , and . FiCloud Workshops, page 246-251. IEEE Computer Society, (2016)Using a room metaphor for e-forensic working environments., , , and . e-Forensics, page 3. ICST/ACM, (2008)