Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Signatures for Intrusion Detection., and . ACSAC, page 252-261. IEEE Computer Society, (2001)Ask not what your postdoc can do for you ..., , , , , and . Commun. ACM, 61 (1): 42-44 (2018)The curious ways of professional cultures and the "two-body opportunity".. SIGCSE Bulletin, 34 (2): 24-25 (2002)The explosive growth of postdocs in computer science.. Commun. ACM, 56 (2): 37-39 (2013)Using the fluorescence decay of 2-aminopurine to investigate conformational change in the recognition sequence of the EcoRV DNA-(adenine-N6)-methyltransferase on enzyme binding, , , , and . Biophysical Chemistry, 160 (1): 28-34 (2012)An Integrated Instrumentation Environment for Multiprocessors., , , , and . IEEE Trans. Computers, 32 (1): 4-14 (1983)A Language Extension for Controlling Access to Shared Data., and . IEEE Trans. Software Eng., 2 (4): 277-285 (1976)Complex Systems - The External Influences.. ICECCS, IEEE Computer Society, (1995)TASK Forces: Distributed Software for Solving Problems of Substantial Size., and . ICSE, page 315-331. IEEE Computer Society, (1979)Software management of Cm*: a distributed multiprocessor., , , , and . AFIPS National Computer Conference, volume 46 of AFIPS Conference Proceedings, page 657-663. AFIPS Press, (1977)