Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restructuring tertiary education in Malaysia, , and . Higher Education Policy, (1998)Secret Key Generation within Peer-to-Peer Network Overlays., , and . 3PGCIC, page 156-163. IEEE, (2012)Analysis and design of fuzzy control systems using dynamic fuzzy-state space models., , and . IEEE Trans. Fuzzy Syst., 7 (2): 192-200 (1999)Identification of dynamic fuzzy models., and . Fuzzy Sets Syst., 74 (3): 307-320 (1995)Side Effects of Digital Technology.. Computer, 35 (4): 102-104 (2002)The Evitability of Software Patents.. Computer, 33 (3): 30-34 (2000)The Rise and Rise of Digital Gluttony.. Computer, 43 (5): 96, 94-95 (2010)Why Johnny Can't Program.. Computer, 33 (12): 158-160 (2000)32 & 16 Years Ago.. Computer, 47 (2): 14-15 (2014)32 & 16 Years Ago.. Computer, 46 (5): 13-14 (2013)