Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Integrated User-Support Environment (IN-USE) Group at USC/ISI., , , , , , , and . INTERCHI, page 53-54. ACM, (1993)DASHER: A Prototype for Federated E-Commerce Services., , , , , , , , and . IEEE Internet Comput., 1 (6): 62-71 (1997)Optical Broadband Services Networks., and . Encyclopedia of Wireless and Mobile Communications, (2008)Private and Cheating-Free Outsourcing of Algebraic Computations., and . PST, page 240-245. IEEE, (2008)Multi-objective optimization in architectural design., and . SpringSim, page 191. SCS/ACM, (2010)German Perception Verbs: Automatic Classification of Prototypical and Multiple Non-literal Meanings., , and . KONVENS, page 207-214. Universitätsbibliothek Hildesheim, (2014)Crowdsourced Fabrication, , , , , , , , , and 13 other author(s). Proceedings of the 29th Annual Symposium on User Interface Software and Technology - UIST '16, page 15-28. ACM Press, (2016)A Cognitive Approach to Intrusion Detection.. CISDA, page 161-168. IEEE, (2007)VMSoar: a cognitive agent for network security., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 5812 of SPIE Proceedings, page 72-80. SPIE, (2005)Semantic encoding of relational databases in wireless networks., and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 5812 of SPIE Proceedings, page 255-262. SPIE, (2005)