Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational Processes Generated by Programs with Recursive Procedures and Block Structures., and . MFCS, volume 45 of Lecture Notes in Computer Science, page 503-509. Springer, (1976)Annotated Trees and their Applications to XML Compression., , and . WEBIST (1), page 27-39. SciTePress, (2014)Parameterized Role-Based Access Control Policies for XML Documents., , and . Inf. Secur. J. A Glob. Perspect., 18 (6): 282-296 (2009)C as a second language, and . Addison-Wesley series in computer science Addison-Wesley, Reading, Mass. u.a., Repr. with corr. edition, (1988)Computer-Supported Human Cooperation in Electronic Classrooms., and . J. Univers. Comput. Sci., 2 (10): 679-693 (1996)AETA: Algorithm Explanation Teaching Agent., , and . ITNG, page 616-621. IEEE Computer Society, (2007)Analysis of Java Client/Server and Web Programming Tools for Development of Educational Systems.. WebNet, AACE, (1998)Permutation Based XML Compression., , and . WEBIST (Revised Selected Papers), volume 226 of Lecture Notes in Business Information Processing, page 63-78. Springer, (2014)Yet Another Way to Explain Algorithms., , and . CATE, page 136-141. ACTA Press, (2004)Column-oriented Database Systems and XML Compression., , and . DATA, page 107-115. SciTePress, (2014)