Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Integrating Autonomously Created Knowledge Descriptions for the Semantic Web., and . ICWE, volume 3140 of Lecture Notes in Computer Science, page 595-596. Springer, (2004)Agent-based configuration management of distributed applications., , , and . CDS, page 52-59. IEEE, (1996)Integrating New Document Types into Digital Libraries., and . ADL, page 56-65. IEEE Computer Society, (1998)Software-Based Copy Protection for Temporal Media During Dissemination and Playback., , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 362-377. Springer, (2005)Transience Versus Recurrence for Scale-Free Spatial Networks., , , and . WAW, volume 12091 of Lecture Notes in Computer Science, page 96-110. Springer, (2020)The Directed Age-Dependent Random Connection Model with Arc Reciprocity., and . WAW, volume 14671 of Lecture Notes in Computer Science, page 97-114. Springer, (2024)The Emergence of a Giant Component in One-Dimensional Inhomogeneous Networks with Long-Range Effects., , and . WAW, volume 13894 of Lecture Notes in Computer Science, page 19-35. Springer, (2023)Protecting online games against cheating., , and . NETGAMES, page 20. ACM, (2006)Tamper Protection of Online Clients through Random Checksum Algorithms., , and . ISTA, volume P-84 of LNI, page 67-79. GI, (2006)INDIGO - An Approach to Infrastructures for Digital Libraries.. ECDL, volume 1923 of Lecture Notes in Computer Science, page 158-167. Springer, (2000)