Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Password Security - A Case History., and . Commun. ACM, 22 (11): 594-597 (1979)Systems Architecture, Design, Engineering, and Verification - The Practice in Research and Research in Practice., , , , and . ACM-TURING, page 6:1. ACM, (2012)Reading Chess., and . IEEE Trans. Pattern Anal. Mach. Intell., 12 (6): 552-559 (1990)The Use of Name Spaces in Plan 9., , , , and . ACM SIGOPS Oper. Syst. Rev., 27 (2): 72-76 (1993)Tributes to Tony Scherzer., and . J. Int. Comput. Games Assoc., 18 (1): 37-38 (1995)6-Piece Endgames.. J. Int. Comput. Games Assoc., 19 (4): 215-226 (1996)New Results for KNPKB and KNPKN Endgames.. J. Int. Comput. Games Assoc., 14 (1): 17 (1991)Second World Microcomputer Chess Championship., and . J. Int. Comput. Games Assoc., 4 (2): 16-31 (1981)Results and Games.. J. Int. Comput. Games Assoc., 13 (4): 211-214 (1990)Unix and Beyond: An Interview with Ken Thompson., , , and . Computer, 32 (5): 58-64 (1999)