Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inheritance and Reusability., and . Australian Software Engineering Conference, page 184-191. IEEE Computer Society, (1998)Share and enjoy - Patterns for Successful Knowledge Sharing in Large Online Communities., and . EuroPLoP, page 1-20. UVK - Universitaetsverlag Konstanz, (2005)Usage-Centered Design and Software Engineering: Models for Integration., , and . ICSE Workshop on SE-HCI, page 106-113. IFIP, (2003)Smarter Cut-and-Paste for Programming Text Editors., , and . AUIC, page 56-63. IEEE Computer Society, (2001)From Incident to Insight: Incident Responders and Software Innovation., , and . IEEE Software, 36 (1): 56-62 (2019)User Study, Analysis, and Usable Security of Passwords Based on Digital Objects., , , and . IEEE Trans. Information Forensics and Security, 6 (3-2): 970-979 (2011)Notes on notes on postmodern programming., and . SIGPLAN Notices, 39 (12): 40-56 (2004)Surface Applications for Security Analysis., , , , and . Collaboration Meets Interactive Spaces, Springer, (2016)Myagile: sociological and cultural effects of agile on teams and their members., , , and . CHASE@ICSE, page 73-76. ACM, (2018)ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis., , and . SIW@CCS, page 9-16. ACM, (2014)