Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding Implicit Invocation to Languages: Three Approaches., , , and . ISOTAS, volume 742 of Lecture Notes in Computer Science, page 489-510. Springer, (1993)Refactoring Tools., , , , , , and . ECOOP Workshops, volume 4906 of Lecture Notes in Computer Science, page 193-202. Springer, (2007)How Port Ensembles Aid the Efficient Retargeting of Reduction Algorithms., , , and . ICPP (2), page 286-287. Pennsylvania State University Press, (1990)0-271-00728-1.Middleware for Reliable Mobile Medical Workflow Support in Disaster Settings., , , and . AMIA, AMIA, (2006)Tablet Computing for Disaster Scene Managers., , , , , and . AMIA, AMIA, (2006)A Web-Services Architecture Designed for Intermittent Connectivity to Support Medical Response to Disasters., , and . AMIA, AMIA, (2005)Classroom experience report on jigsaw learning., , and . ITiCSE, page 302-307. ACM, (2018)Ubiquitous presenter: increasing student access and control in a digital lecturing environment., , and . SIGCSE, page 116-120. ACM, (2005)Component design of retargetable program analysis tools that reuse intermediate representations., , and . ICSE, page 356-365. ACM, (2000)DELPHI: Data E-platform for personalized population health., , , , , , , , , and 1 other author(s). Healthcom, page 115-119. IEEE, (2013)