Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Before and After WOWCS: A literature survey, A list of papers we wish had been submitted., and . WOWCS, USENIX Association, (2008)Robust Correspondenceless 3-D Iris Location for Immersive Environments., , , and . ICIAP, volume 3617 of Lecture Notes in Computer Science, page 123-130. Springer, (2005)Teaching knowledge engineering: Experiences., and . AI in Structural Engineering, volume 1454 of Lecture Notes in Computer Science, page 424-427. Springer, (1998)Brian Randell: A Biographical Note., and . Dependable and Historic Computing, volume 6875 of Lecture Notes in Computer Science, page 7-14. Springer, (2011)High resolution depth-resolved imaging from multi-focal images for medical ultrasound., , , , , and . EMBC, page 7067-7070. IEEE, (2015)Open issues in organizing computer systems conferences., and . Computer Communication Review, 38 (3): 93-102 (2008)Who Cares about System Verification?. IEEE Design & Test of Computers, 20 (3): 114- (2003)The distributed Smalltalk survival guide.. ACM SIGSOFT Software Engineering Notes, 25 (3): 58 (2000)The NEBULA Future Internet Architecture., , , , , , , , , and 10 other author(s). Future Internet Assembly, volume 7858 of Lecture Notes in Computer Science, page 16-26. Springer, (2013)Protective Wrapper Development: A Case Study., , , and . ICCBSS, volume 2580 of Lecture Notes in Computer Science, page 1-14. Springer, (2003)