Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Core Method for Real-Time Requirements., , , and . IEEE Software, 9 (5): 22-33 (1992)Can Structured Methods be Objectified? (Panel)., , , , and . OOPSLA, page 162. ACM, (1991)SIGPLAN Notices 26(11) / OOPSLA'91, Addendum to the Proceedings: OOPS Messenger 3(4) October 1992.Integrating Humans with Intelligent Technologies: Merging Theories of Collaborative Intelligence and Expert Cognition., , and . HICSS, IEEE Computer Society, (2005)Revealing perceptual-cognitive expertise in law enforcement: an iterative approach using verbal-report, temporal-occlusion, and option-generation methods., and . Cognition, Technology & Work, 20 (4): 585-596 (2018)The effect of time constraint on anticipation, decision making, and option generation in complex and dynamic environments., , and . Cognition, Technology & Work, 17 (3): 355-366 (2015)Special issue of interacting with computers: Symbiotic performance between humans and intelligent systems., , and . Interacting with Computers, 18 (6): 1165-1169 (2006)Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded Systems., , , and . CSE (2), page 394-401. IEEE Computer Society, (2009)Commercialization of technology research for benefit., and . CASCON, page 340-343. IBM / ACM, (2015)Trusted Computing for Protecting Ad-hoc Routing., and . CNSR, page 61-68. IEEE Computer Society, (2006)A Run-Time Configurable Software Architecture for Self-Managing Systems., , , , and . ICAC, page 207-208. IEEE Computer Society, (2008)