Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Satellite Ocean Color Match-Up Protocols Using the Satellite Validation Navy Tool (SAVANT) at MOBY and Two AERONET-OC Sites., , , , , , , and . Remote. Sens., 13 (14): 2673 (2021)Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication., , , and . EUROCRYPT (5), volume 14008 of Lecture Notes in Computer Science, page 98-127. Springer, (2023)Decentralized Authorization in a Database System., and . VLDB, page 352-359. IEEE Computer Society, (1979)Library of Congress Number 7987908.Database Buffer Paging in Virtual Storage Systems., , and . ACM Trans. Database Syst., 2 (4): 339-351 (1977)What Lies Above: Alternative User Experiences Produced Through Focussing Attention on GNSS Infrastructure., , , and . Conference on Designing Interactive Systems, page 161-172. ACM, (2017)Q-Data: Using Deductive Database Technology to Improve Data Quality., , and . Workshop on Programming with Logic Databases (Book), ILPS, page 23-56. Kluwer, (1993)What lies above: using poetic methods to interrogate user positions across GNSS infrastructures.. Queen Mary University of London, UK, (2018)British Library, EThOS.Crowd Sourced approach towards Sustainability and Productivity., , , and . AMCIS, Association for Information Systems, (2018)BirdVis: Visualizing and Understanding Bird Populations., , , , , , and . IEEE Trans. Vis. Comput. Graph., 17 (12): 2374-2383 (2011)Keyloggers in Cybersecurity Education., and . Security and Management, page 293-299. CSREA Press, (2010)