From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of the SSL 3.0 protocol, и . WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, стр. 4. Berkeley, CA, USA, USENIX Association, (1996)Optimization of Operational Parameters in Biogas Plants using the Anaerobic Digestion Model Number 1 (ADM1)., и . Simul. Notes Eur., 30 (1): 11-14 (2020)The cognition of comics: What "comics" can tell us about the mind., , , и . CogSci, cognitivesciencesociety.org, (2014)The impact of information technology on knowledge creation: an affordance approach to social media., , и . J. Enterp. Inf. Manag., (2013)Technological Platforms and Innovation: Review, Integration, and Extension., , и . AMCIS, Association for Information Systems, (2015)Secure Verification of Location Claims, , и . Proceedings of the 2Nd ACM Workshop on Wireless Security, стр. 1--10. New York, NY, USA, ACM, (сентября 2003)Audio Adversarial Examples: Targeted Attacks on Speech-to-Text, и . (2018)cite arxiv:1801.01944.Managing Cloud Computing Across the Product Lifecycle: Development of a Conceptual Model., и . WEB, том 403 из Lecture Notes in Business Information Processing, стр. 133-142. Springer, (2019)Designing SPOCs for Student Engagement - Experiences from Management Education., , , , и . EMOOCs-WIP, том 1841 из CEUR Workshop Proceedings, стр. 40-46. CEUR-WS.org, (2017)Service Component Mobility Enabled by Network Virtualization, , , , , , , , и . Euroview 2011, (августа 2011)