Author of the publication

The Data-Gathering Broker - A User-Based Approach to Viable EPR Systems.

, , , , , , , , , and . MIE, volume 116 of Studies in Health Technology and Informatics, page 905-910. IOS Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for a Broadband Cellular Wireless Network for Digital Communications., , and . Computer Networks and ISDN Systems, 26 (4): 391-402 (1993)Approaches to program comprehension., , , and . J. Syst. Softw., 14 (2): 79-84 (1991)An Algorithm for Resource Location in a Loosely Linked Distributed Computer System., and . ACM SIGOPS Oper. Syst. Rev., 15 (2): 16-20 (1981)Model-based tools to record program understanding., and . WPC, page 87-95. IEEE, (1993)Developing a model to manage the software maintenance process., and . ICSM, page 174-182. IEEE Computer Society, (1992)The Data-Gathering Broker - A User-Based Approach to Viable EPR Systems., , , , , , , , , and . MIE, volume 116 of Studies in Health Technology and Informatics, page 905-910. IOS Press, (2005)Using Web Service Technologies to Create an Information Broker: An Experience Report., , , , , , , , , and . ICSE, page 552-561. IEEE Computer Society, (2004)Private Information Retrieval in the Presence of Malicious Failures., , and . COMPSAC, page 805-812. IEEE Computer Society, (2002)Bylands: reverse engineering safety-critical systems., , , and . ICSM, page 358-366. IEEE Computer Society, (1995)Do Program Transformations Help Reverse Engineering?. ICSM, page 247-. IEEE Computer Society, (1998)