Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reference Architecture of Human Cyber-Physical Systems - Part III: Semantic Foundations., , , , , , , , , and 13 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 4:1-4:23 (January 2024)The White Color of Television Receivers., , and . CIC, page 185-187. Society for Imaging Science and Technology, (1993)ND: A Comprehensive Network Administration and Analysis Tool., , and . LISA, page 275-283. USENIX, (2000)A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction., , , , , , , , , and 13 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 3:1-3:27 (January 2024)A Reference Architecture of Human Cyber-Physical Systems - Part I: Fundamental Concepts., , , , , , , , , and 12 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 2:1-2:32 (January 2024)The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment., , and . USENIX Security Symposium, USENIX Association, (1993)A Unix network protocol security study: network information service., , and . Comput. Commun. Rev., 22 (5): 24-28 (1992)Texas A&M University Anarchistic Key Authorization (AKA)., , and . USENIX Security Symposium, USENIX Association, (1996)The Locus of Context Effects in Word Recognition. Department of Psychology, The University of Texas at Austin, Austin, TX, (1995)Cognitive Walkthroughs: Understanding the Effect of Task-Description Detail on Evaluator Performance., and . Int. J. Hum. Comput. Interaction, 11 (3): 185-200 (1999)