Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why zombies cannot write significant source code: The Knowledge Game and the art of computer programming., and . J. Exp. Theor. Artif. Intell., 27 (1): 37-50 (2015)Turning Time from Enemy into an Ally Using the Pomodoro Technique., , and . CoRR, (2014)Rethinking Third Places: Contemporary Design With Technology., , , , , and . J. Community Informatics, (2014)An Investigation of the Impact of a Social Constructivist Teaching Approach, based on Trigger Questions, Through Measures of Mental Workload and Efficiency., , , and . CSEDU (2), page 292-302. SciTePress, (2018)978-989-758-291-2.From Ancient to Modern Computing: A History of Information Hiding., and . IEEE Ann. Hist. Comput., 35 (3): 33-39 (2013)Application of Hybrid Agents to Smart Energy Management of a Prosumer Node., , , , and . DCAI, volume 217 of Advances in Intelligent Systems and Computing, page 597-607. Springer, (2013)Complex Arguments in Adpositional Argumentation., , and . AI³@AI*IA, volume 3086 of CEUR Workshop Proceedings, CEUR-WS.org, (2021)Supporting dynamic community bonding in emergency situations., , and . SEBD, page 207-214. Curran Associates, (2013)Elio Lanzarone: a life for science., and . J. Log. Comput., 25 (6): 1371-1378 (2015)Turning Time from Enemy into an Ally Using the Pomodoro Technique., , and . Agility Across Time and Space, Springer, (2010)