Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Solution to Authentication of Images with a Secure Camera., , , , and . Storage and Retrieval for Image and Video Databases (SPIE), volume 3022 of SPIE Proceedings, page 290-297. SPIE, (1997)Guest Editorial., , , and . Int. J. Computer Integrated Manufacturing, 20 (7): 617-618 (2007)Compiling matrix operations., and . Commun. ACM, 5 (12): 590-594 (1962)ACM: A coming of age.. Commun. ACM, 11 (4): 221 (1968)Erratum to: Foot trajectory approximation using the pendulum model of walking., , , , and . Med. Biol. Engineering and Computing, 52 (5): 509 (2014)President's letter to the ACM membership: The journal.. Commun. ACM, 12 (2): 65-66 (1969)ACM president's letter: "I protest".. Commun. ACM, 12 (8): 421 (1969)Letter to the editor: criticisms of ALGOL 60., , and . Commun. ACM, 4 (7): 309 (1961)A proposal for definitions in ALGOL., and . Commun. ACM, 10 (4): 204-219 (1967)Letters., , and . Commun. ACM, 3 (6): 13 (1960)