Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Programming by Examples.. Artif. Intell., 12 (1): 1-21 (1979)Using the vista 350 telephone to communicate the results of home monitoring of diabetes mellitus to a central database and to provide feedback., , , , , , , , , and . I. J. Medical Informatics, 51 (2-3): 117-125 (1998)Revealing the inherent heterogeneity of human malignancies by variant consensus strategies coupled with cancer clonal analysis., , , , and . BMC Bioinformatics, 15 (S-11): S9 (2014)Introduction., , , and . Information Systems Frontiers, 5 (2): 127-128 (2003)WikiHyperGlossary (WHG): an information literacy technology for chemistry documents., , , and . J. Cheminformatics, (2015)Services Supporting Management of Distributed Applications and Systems., , , , , , , , , and 3 other author(s). IBM Systems Journal, 36 (4): 508-526 (1997)Mapping Policies into Autonomic Management Actions., , and . ICAS, page 38. IEEE Computer Society, (2006)An Adaptive Reinforcement Learning Approach to Policy-Driven Autonomic Management., and . ICAS, page 135-141. IEEE Computer Society, (2009)An Object/Message Model for the Development of Integrated Workstation Software., and . SIGSMALL/PC Symposium, page 43-52. ACM, (1990)A User-Centric Authentication for Advanced Resource Reservation in Mobile Grid Environments., , , , , and . GCA, page 77-83. CSREA Press, (2010)