Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements engineering in new product development., , , , , and . Commun. ACM, 51 (3): 77-82 (2008)Using Computational Modeling for Building Theory: A Double Edged Sword., and . J. Artif. Soc. Soc. Simul., (2016)Measuring the Effectiveness of Personal Database Structures., , , and . Int. J. Man Mach. Stud., 31 (3): 237-256 (1989)A Conceptual Model aod Experiments on How People Classify and Retrieve Documents., , and . SIGIR, page 282-287. ACM, (1985)Strategies for supplier evaluation: a framework for potential advantages and limitations., and . IEEE Trans. Engineering Management, 47 (4): 435-443 (2000)Some Effects of Electronic Mail Use on the Quality of Relationships between Different Organizational Functions., , and . Computer Networks and ISDN Systems, 28 (6): 799-809 (1996)Computerized Performance Monitoring Systems: Use and Abuse., , and . Commun. ACM, 29 (8): 794-801 (1986)A Critical Appraisal of Task Taxonomies as a Tool for Studying Office Activities., and . ACM Trans. Inf. Syst., 2 (4): 331-339 (1984)An experimental study of a gestalt based database for mug shots., , and . INTERACT, page 225-230. Chapman & Hall, (1995)The retrieval of images from image databases: trademarks., , and . Behav. Inf. Technol., 14 (1): 3-13 (1995)