Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Methodology for Characterizing the Correspondence Between Real and Proxy Applications., , , , , and . CLUSTER, page 190-200. IEEE Computer Society, (2018)Representation of Hierarchically Structured Data in the Proposed ERDA Exchange Standard.. Berkeley Workshop, page 221-. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1976)Development of "Real World" Project Skills for Engineering Students., and . IJQAETE, 2 (1): 1-13 (2012)Proxy or Imposter? A Method and Case Study to Determine the Answer., , , and . CLUSTER, page 1-9. IEEE, (2019)Digital directions: widening the educational net for information professionals., , and . Education for Information, 17 (4): 281-294 (1999)Testing Safety Critical Systems with SysML/UML., , , and . ICECCS, page 325-330. IEEE Computer Society, (2010)Information Integration from Heterogeneous Data Sources: a Semantic Web Approach., , , and . AMIA, AMIA, (2006)Services Oriented Architectures and Rapid Deployment of Ad-Hoc Health Surveillance Systems: Lessons from Katrina Relief Efforts., , , , , , and . AMIA, AMIA, (2006)The Berkeley Data-Base Management System.. Berkeley Workshop, page 335. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1976)Mathematical modelling of Zika virus as a mosquito-borne and sexually transmitted disease with diffusion effects., , , and . Mathematics and Computers in Simulation, (2019)