Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Point/counterpoint: For-profit institutions in the higher education reauthorization, , , and . Change, 37 (3): 20--27 (2005)3.Does autonomy help Help? The impact of unsolicited hints and choice on help avoidance and learning., , , , and . EDM, International Educational Data Mining Society, (2020)Historical Analysis of Exploit Availability Timelines., , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2020)Introducing ReConfigME: An Operating System for Reconfigurable Computing., , and . FPL, volume 2438 of Lecture Notes in Computer Science, page 687-697. Springer, (2002)Abstractions and primitives enabling runtime resource allocation for dynamic IP cores using virtual platform FPGAs., , and . FPT, page 403-406. IEEE, (2003)Optimizing Seed Selection for Fuzzing., , , , , , and . USENIX Security Symposium, page 861-875. USENIX Association, (2014)OPTOPUS: Optical backplane for data center switches., , , , , , , , and . OFC, page 1-3. IEEE, (2014)Interning Ground Terms in XSB.. CoRR, (2013)AppLP: A Dialogue on Applications of Logic Programming., and . CoRR, (2017)Efficient Execution of HiLog in WAM-based Prolog Implementations., and . ICLP, page 349-363. MIT Press, (1995)