Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization., and . D Lib Mag., (1998)Implementing digital libraries (panel session)., , , , and . ACM DL, page 275. ACM, (2000)Core services in the architecture of the national science digital library (NSDL)., , , , , , , , , and 5 other author(s). JCDL, page 201-209. ACM, (2002)Cross-Organizational Access Management: A Digital Library Authentication and Authorization Architecture.. D Lib Mag., (1999)Integrating digital libraries and electronic publishing in the DART project., , and . JCDL, page 114-120. ACM, (2005)Core Services in the Architecture of the National Digital Library for Science Education (NSDL), , , , , , , , , and 5 other author(s). CoRR, (2002)Enhancing Services to Preserve New Forms of Scholarship., , , , and . iPRES, (2019)Computing the Implicit Voronoi Diagram in Triple Precision., and . WADS, volume 5664 of Lecture Notes in Computer Science, page 495-506. Springer, (2009)Review of Geometric folding algorithms by authors: E.D. Demaine and J. O'Rourke., and . SIGACT News, 42 (1): 43-46 (2011)If You Must Choose Among Your Children, Pick the Right One., , , and . CoRR, (2021)