Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing a Data-Driven Method for Estimating Provider Penetration and Abusive Billing Practices., , , , , and . HICSS, IEEE Computer Society, (2001)Porting Unix to new hardware., and . Microprocessors and Microsystems - Embedded Hardware Design, 9 (7): 350-353 (1985)A comparison of two methods of scaling on form perception via a haptic interface., , , and . ICMI, page 236-243. ACM, (2005)Manipulation d'un zoom haptique continu via un dispo-sitif de substitution sensorielle., , , and . IHM, page 63-70. ACM, (2007)Reply to Ripps., and . Artif. Life, 11 (3): 365 (2005)Incorporating Component Content Management and Content Strategy into Technical Communication Curricula., , , , and . SIGDOC, page 35. ACM, (2016)Life After Ashby: Ultrastability and the Autopoietic Foundations of Biological Autonomy., and . Cybernetics and Human Knowing, 17 (4): 7-49 (2010)Enactive Cognitive Science and Biology of Cognition: A Response to Humberto Maturana., and . Cybernetics and Human Knowing, 19 (4): 61-74 (2012)Overview of a High Speed Top Side Socket Solution., and . ITC, page 1. IEEE Computer Society, (2008)Spatially Scalable HEVC for Layered Division Multiplexing in Broadcast., , , , , , , , , and 1 other author(s). DCC, page 3-12. IEEE, (2017)