Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security thread in a thread-based curriculum.. SIGITE Conference, page 193-200. ACM, (2008)The online customer-built WEB3D middleware system for arts and crafts., , , , , and . SIGGRAPH Posters, page 30:1. ACM, (2010)Interactive Game Development with a Projector-Camera System.. Edutainment, volume 5093 of Lecture Notes in Computer Science, page 535-543. Springer, (2008)A discussion on security typing and measurement for SOA., , and . ACM SIGSOFT Softw. Eng. Notes, 34 (3): 1-5 (2009)Developing and improving interdisciplinary health information technology certificate programs., , , , and . SIGITE Conference, page 43-48. ACM, (2012)A 3-D flowering simulation based on botany characteristics and random generation algorithm., , , , and . SIGGRAPH Posters, page 1:1. ACM, (2010)IT education in the flattening world.. SIGITE Conference, page 99-104. ACM, (2006)The 2+2 bachelor of applied science in information technology follow-up 2 years later: dealing with challenges., , and . SIGITE Conference, page 149-154. ACM, (2011)Relating Software Coupling Attribute and Security Vulnerability Attribute., , , and . Software Engineering Research and Practice, page 500-506. CSREA Press, (2010)Effects of communication, leadership, and team performance on successful IT capstone projects: a case study., and . SIGITE Conference, page 281-286. ACM, (2011)