Author of the publication

Personal Knowledge Management - Beyond Versioning.

, , and . LWA, page 242-249. Fakultät für Informatik, Otto-von-Guericke-Universität Magdeburg, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software-Ergonomie in Banken und Versicherungen., and . Software-Ergonomie, volume 45 of Berichte des German Chapter of the ACM, page 407-408. Teubner, (1995)Visualisierung vernetzter Strukturen - Erfahrungsbericht eines Workshops der Tagung Mensch & Computer 2002 in Hamburg., and . i-com, 2 (2): 47-50 (2003)Suchen & Finden im Knowledge Broker Network, , and . i-com Zeitschrift für interaktive und kooperative Medien, 5 (2): 17-24 (2006)A security framework for online distance learning and training., , , , , , and . Internet Res., 8 (3): 236-242 (1998)Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes., , and . TrustBus, volume 4657 of Lecture Notes in Computer Science, page 178-189. Springer, (2007)Suchen & Finden im Knowledge Broker Network (Searching & Finding in the Knowledge Broker Network)., , and . i-com, 5 (2): 17-25 (2006)Service Quality Assessment in Distance Learning., , , and . INC, page 269-277. University of Plymouth, (2010)A Framework for Improved QoS Evaluation and Control in SIP-Based NGN., , , , and . INC, page 27-37. University of Plymouth, (2008)Security Policy Enforcement in BPEL-Defined Collaborative Business Processes., , , and . ICDE Workshops, page 685-694. IEEE Computer Society, (2007)Analysis of security-relevant semantics of BPEL in cross-domain defined business processes., , , and . Inf. Manag. Comput. Secur., 15 (2): 116-127 (2007)