Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What is a knowledge representation?, , and . AI magazine, 14 (1): 17 (1993)End User Empowerment in Human Centered Pervasive Computing, , and . Proceedings of the First International Conference on Pervasive Computing (Short paper), page 134--140. Zurich, (August 2002)In an informal companion volume of short papers..A plan-based mission control center for autonomous vehicles., and . IUI, page 277-279. ACM, (2004)AWDRAT: A Cognitive Middleware System for Information Survivability., , , , , , , and . AI Magazine, 28 (3): 73-91 (2007)A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities., , , and . IEEE Access, (2018)Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance., , , , , , , , , and 4 other author(s). CoRR, (2021)One-Push Sharing: Facilitating Picture Sharing from Camera Phones., , and . Mobile HCI, volume 3160 of Lecture Notes in Computer Science, page 466-470. Springer, (2004)Active Trust Management for Autonomous Adaptive Survivable Systems., and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 40-49. Springer, (2000)Introduction: The First International Workshop on Self-Adaptive Software., , and . IWSAS, volume 1936 of Lecture Notes in Computer Science, page 1-10. Springer, (2000)Preventing Kernel Hacks with HAKCs., , , , , , and . NDSS, The Internet Society, (2022)