Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing the Intrusion Detection Exchange Protocol., , , , , , and . ACSAC, page 32-41. IEEE Computer Society, (2001)The RMON MIB: Implementation and Network Management Issues.. Integrated Network Management, volume C-12 of IFIP Transactions, page 81. North-Holland, (1993)RMON - From Concept to Specification.. Integrated Network Management, volume C-12 of IFIP Transactions, page 73-80. North-Holland, (1993)Models of Hierarchical Machine Support., , , and . Formal Description of Programming Concepts, page 557-588. North-Holland, (1977)MyCS: CS for middle-years students and their teachers., , and . SIGCSE, page 337-342. ACM, (2014)On the teaching of Ada in an undergraduate computer science curriculum., and . SIGCSE, page 58-61. ACM, (1987)MyCS: middle-years computer science (abstract only)., and . SIGCSE, page 732. ACM, (2013)Reviewing NSF Proposals: Learn about Effective Proposal Writing via the Review Process (Abstract Only)., and . SIGCSE, page 711. ACM, (2015)MyCS: building a middle-years CS curriculum., and . ITiCSE, page 330. ACM, (2013)Decentralizing control and intelligence in network management., , , , , and . Integrated Network Management, volume 11 of IFIP Conference Proceedings, page 4-16. Chapman & Hall, (1995)