Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the SSL 3.0 protocol, and . WOEC 1996: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, page 4. Berkeley, CA, USA, USENIX Association, (1996)Optimization of Operational Parameters in Biogas Plants using the Anaerobic Digestion Model Number 1 (ADM1)., and . Simul. Notes Eur., 30 (1): 11-14 (2020)The cognition of comics: What "comics" can tell us about the mind., , , and . CogSci, cognitivesciencesociety.org, (2014)Technological Platforms and Innovation: Review, Integration, and Extension., , and . AMCIS, Association for Information Systems, (2015)Secure Verification of Location Claims, , and . Proceedings of the 2Nd ACM Workshop on Wireless Security, page 1--10. New York, NY, USA, ACM, (September 2003)The impact of information technology on knowledge creation: an affordance approach to social media., , and . J. Enterp. Inf. Manag., (2013)Audio Adversarial Examples: Targeted Attacks on Speech-to-Text, and . (2018)cite arxiv:1801.01944.Designing SPOCs for Student Engagement - Experiences from Management Education., , , , and . EMOOCs-WIP, volume 1841 of CEUR Workshop Proceedings, page 40-46. CEUR-WS.org, (2017)Managing Cloud Computing Across the Product Lifecycle: Development of a Conceptual Model., and . WEB, volume 403 of Lecture Notes in Business Information Processing, page 133-142. Springer, (2019)Service Component Mobility Enabled by Network Virtualization, , , , , , , , and . Euroview 2011, (August 2011)