From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementing the Intrusion Detection Exchange Protocol., , , , , , и . ACSAC, стр. 32-41. IEEE Computer Society, (2001)The RMON MIB: Implementation and Network Management Issues.. Integrated Network Management, том C-12 из IFIP Transactions, стр. 81. North-Holland, (1993)RMON - From Concept to Specification.. Integrated Network Management, том C-12 из IFIP Transactions, стр. 73-80. North-Holland, (1993)MyCS: CS for middle-years students and their teachers., , и . SIGCSE, стр. 337-342. ACM, (2014)On the teaching of Ada in an undergraduate computer science curriculum., и . SIGCSE, стр. 58-61. ACM, (1987)Models of Hierarchical Machine Support., , , и . Formal Description of Programming Concepts, стр. 557-588. North-Holland, (1977)MyCS: building a middle-years CS curriculum., и . ITiCSE, стр. 330. ACM, (2013)Reviewing NSF Proposals: Learn about Effective Proposal Writing via the Review Process (Abstract Only)., и . SIGCSE, стр. 711. ACM, (2015)MyCS: middle-years computer science (abstract only)., и . SIGCSE, стр. 732. ACM, (2013)Decentralizing control and intelligence in network management., , , , , и . Integrated Network Management, том 11 из IFIP Conference Proceedings, стр. 4-16. Chapman & Hall, (1995)