Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition of Urban Roads on Large-Scale Maps: the Prototypical Cases., , and . IGIS, volume 884 of Lecture Notes in Computer Science, page 225-236. Springer, (1994)Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks., , , , , , , and . RFC, (August 2014)Focusing on what might happen and how it could feel: can the anticipation of regret change students' computing-related choices?, and . Int. J. Hum. Comput. Stud., 62 (6): 759-783 (2005)Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack., , , , and . DISCEX (1), page 120-129. IEEE Computer Society, (2003)Experiment: Flexbox Adventures. (2014)Hierarchical Clustering-based Segmentation (HCS) Aided Interpretation of the DCE MR Images of the Prostate., , and . MIUA, page 106-111. BMVA, (2015)Timing the Application of Security Patches for Optimal Uptime., , , , , and . LISA, page 233-242. USENIX, (2002)RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities., , , and . USENIX Security Symposium, USENIX, (2001)Magnetic Field Structures in Star Forming Regions: Mid-Infrared Imaging Polarimetry of K3-50, , , , , , , , , and . (Jun 6, 2015)A compact concentration of large grains in the HD142527 protoplanetary dust trap, , , , , , , , , and 4 other author(s). (May 28, 2015)