Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Uncovering the epistemological and ontological assumptions of software designers, and . CoRR, (2004)An image analysis pipeline for the semi-automated analysis of clinical fMRI images based on freely available software., , , , , , and . Comput. Biol. Medicine, 40 (3): 279-287 (2010)A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities., , and . MILCOM, page 1-6. IEEE, (2012)Methods for optimizing the performance of directed acyclic graphs operating under strict energy constraints on multi-core architectures., , and . Sustain. Comput. Informatics Syst., 1 (2): 99-112 (2011)Philosophical Smoke Signals: Theory and Practice in Information Systems Design, and . CoRR, (2008)Competitive intelligence, software robots and the Internet: the NewsAlert prototype., and . HICSS (4), page 624-634. IEEE Computer Society, (1995)The effective use of a simple wiki to support collaborative learning activities., , and . Comput. Sci. Educ., 19 (4): 293-313 (2009)Blue Waters system and component reliability., , , , , , , and . Concurr. Comput. Pract. Exp., (2024)Jackson design methodology.. ACM SIGSOFT Softw. Eng. Notes, 7 (2): 33-34 (1982)Document Mark-Up for Different Users and Purposes., and . MTSR, volume 390 of Communications in Computer and Information Science, page 355-360. Springer, (2013)