Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reference Architecture of Human Cyber-Physical Systems - Part III: Semantic Foundations., , , , , , , , , and 13 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 4:1-4:23 (January 2024)The White Color of Television Receivers., , and . CIC, page 185-187. Society for Imaging Science and Technology, (1993)ND: A Comprehensive Network Administration and Analysis Tool., , and . LISA, page 275-283. USENIX, (2000)A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction., , , , , , , , , and 13 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 3:1-3:27 (January 2024)A Reference Architecture of Human Cyber-Physical Systems - Part I: Fundamental Concepts., , , , , , , , , and 12 other author(s). ACM Trans. Cyber Phys. Syst., 8 (1): 2:1-2:32 (January 2024)The TAMU Security Package: An Ongoing Response to Internet Intruders in an Academic Environment., , and . USENIX Security Symposium, USENIX Association, (1993)A Unix network protocol security study: network information service., , and . Comput. Commun. Rev., 22 (5): 24-28 (1992)Texas A&M University Anarchistic Key Authorization (AKA)., , and . USENIX Security Symposium, USENIX Association, (1996)The impact of incomplete knowledge on evaluation: an experimental benchmark for protein function prediction., , , , , and . Bioinform., 25 (18): 2404-2410 (2009)The effect of task description detail on evaluator performance with cognitive walkthroughs., and . CHI Conference Summary, page 259-260. ACM, (1998)