Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing rhythmic motions using neural oscillators.. IROS, page 494-500. IEEE, (1999)Resilient infrastructure for network security.. Complex., 9 (2): 34-40 (2003)Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail., , , and . USENIX Annual Technical Conference, General Track, page 45-58. USENIX, (2004)Stiffness Isn't Everything., , , , and . ISER, volume 223 of Lecture Notes in Control and Information Sciences, page 253-262. Springer, (1995)Throttling Viruses: Restricting propagation to defeat malicious mobile code.. ACSAC, page 61-68. IEEE Computer Society, (2002)Design, Implementation and Test of an Email Virus Throttle.. ACSAC, page 76-85. IEEE Computer Society, (2003)Making Complex Articulated Agents Dance., , and . Auton. Agents Multi Agent Syst., 2 (1): 23-43 (1999)Implementing and Testing a Virus Throttle., and . USENIX Security Symposium, USENIX Association, (2003)Robot arm control exploiting natural dynamics.. Massachusetts Institute of Technology, Cambridge, MA, USA, (1999)ndltd.org (oai:dspace.mit.edu:1721.1/16720).Technological networks and the spread of computer viruses, , , and . CoRR, (2004)