Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political., , , , , and . IEEE Technol. Soc. Mag., 30 (1): 28-38 (2011)The Next Generation of Real-Time Operating Systems and Languages.. NATO ASI RTC, volume 127 of NATO ASI Series, page 593-594. Springer, (1992)Disseminating the Best Material to Practitioners., , and . IEEE Software, 34 (3): 111-113 (2017)Measuring the complexity of design in real-time imaging software., , and . Real-Time Image Processing, volume 6496 of SPIE Proceedings, page 64960A. SPIE, (2007)The joy of spam.. ACM Queue, 4 (9): 56- (2006)Classification and overview of research in real-time imaging., , , , and . J. Electronic Imaging, 5 (4): 466-478 (1996)Introducing the Internet of Things Department., and . IT Prof., 20 (1): 15-18 (2018)To Err is Human, to Forgive, AI., and . IT Prof., 21 (4): 4-7 (2019)IT Predictions, 2010.. IT Prof., 12 (1): 53-56 (2010)What's in a Name? Distinguishing between SaaS and SOA., , and . IT Prof., 10 (3): 46-50 (2008)