Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reflections on Programming with Grid Toolkits., and . RAM-SE, page 3-8. Fakultät für Informatik, Universität Magdeburg, (2004)Internet Sensor Grid: Experiences with Passive and Active Instruments., and . WCITD/NF, volume 327 of IFIP Advances in Information and Communication Technology, page 132-145. Springer, (2010)From Dalang to Kava - The Evolution of a Reflective Java Extension., and . Reflection, volume 1616 of Lecture Notes in Computer Science, page 2-21. Springer, (1999)Remotely shooting asteroids on our mobile phone., , and . CHINZ, page 45-52. ACM, (2009)Event log messages as a human interface, or, "do you pine for the days when men were men and wrote their own device drivers?"., , and . OZCHI, page 160-163. ACM, (2010)A Reflective Java Class Loader., and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 374-375. Springer, (1998)Using Remotely Executing Software via a Mobile Device., , and . AUIC, volume 93 of CRPIT, page 3-8. Australian Computer Society, (2009)Impacts of Power Factor Control Schemes in Time Series Power Flow Analysis for Centralized PV Plants Using Wavelet Variability Model., , and . IEEE Trans. Ind. Informatics, 13 (6): 3185-3194 (2017)A Practical Approach to System Preservation Workflows., , , and . Prax. Inf.verarb. Kommun., 35 (4): 269-280 (2012)A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights., , , , , , and . CoRR, (2021)