Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are aposematic signals honest? A review, , , and . Journal of Evolutionary Biology, 28 (9): 1583--1599 (2015)Toward a taxonomy of logical document structures. (1995)Session Initiation Protocol (SIP) Basic Call Flow Examples, , , , and . RFC 3665 (Best Current Practice), (December 2003)Session Initiation Protocol (SIP) Public Switched Telephone Network (PSTN) Call Flows, , , , and . RFC 3666 (Best Current Practice), (December 2003)Session Initiation Protocol Service Examples, , , , and . RFC 5359 (Best Current Practice), (October 2008)Evaluation of relational DBMS's for scientific applications (abstract only).. ACM Conference on Computer Science, page 691. ACM, (1991)A microprocessor selective encryption terminal for privacy protection., , and . AFIPS National Computer Conference, volume 46 of AFIPS Conference Proceedings, page 35-38. AFIPS Press, (1977)AESOP: a prototype for on-line user control of organizational data storage, retrieval and processing., , and . AFIPS Fall Joint Computing Conference (1), page 435-455. ACM, (1965)Enhancing teaching using the Internet: report of the working group on the World Wide Web as an interactive teaching resource., , , , , , , and . ITiCSE, page 218-228. ACM, (1996)