Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Data Curation Toolkit: Cybersecurity Data Collection, Aided-Labeling, and Rule Generation., , , , , and . MILCOM, page 849-854. IEEE, (2021)Open source software adoption by South African MSEs: barriers and enablers, and . Proceedings of the 2009 Annual Conference of the Southern African Computer Lecturers' Association, page 41--49. New York, NY, USA, ACM, (2009)Modelling techniques for analysis of human activity patterns., , , , , , , and . IEEE Conf. of Intelligent Systems, page 275-280. IEEE, (2012)Automated Method for Detecting Acute Insomnia Using Multi-Night Actigraphy Data., , , , and . IEEE Access, (2020)College Preparedness and Time of Learning Disability Identification, , and . Journal of Developmental Education, 32 (3): 28--30 (2009)Buttons vs. menus: An exploratory study of pull-down menu selection as compared to button bars, , , and . (1995)Exploring Big Data with Helix: Finding Needles in a Big Haystack., , , , , and . SIGMOD Rec., 43 (4): 43-54 (2014)Physical Layer Adaptation for Packet Radio Systems with Higher Layer Fountain Coding., and . MILCOM, page 1587-1589. IEEE, (2013)Adaptive incremental-redundancy transmission for tactical packet radio systems., and . MILCOM, page 224-229. IEEE, (2011)Supporting coordinated care: Designing social context visualizations for care teams., , and . IBM J. Res. Dev., (2015)