Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable deception cues training in an interactive video game., , , , , , , , , and 5 other author(s). Comput. Hum. Behav., (2018)The long tail : why the future of business is selling less of more. Hyperion, (Jul 11, 2006)The Long Tail: Why the Future of Business Is Selling Less of More. Hyperion, New York, 2 edition, (2008)Ada 9X Project Management.. Commun. ACM, 35 (11): 83-84 (1992)Automated Classification of Helium Ingress in Irradiated X-750., , , , and . CoRR, (2019)A Self-Learning Architecture for Digital Twins with Self-Protection., , and . ACSOS-C, page 291-292. IEEE, (2021)Neural Networks for Predicting the Output of wind flow Simulations Over Complex Topographies., , and . ICBK, page 184-191. IEEE Computer Society, (2018)ExScal: Elements of an Extreme Scale Wireless Sensor Network., , , , , , , , , and 20 other author(s). RTCSA, page 102-108. IEEE Computer Society, (2005)Using Pareto Front for a Consensus Building, Human Based, Genetic Algorithm., and . ECAL (2), volume 5778 of Lecture Notes in Computer Science, page 175-182. Springer, (2009)Discussion of 'Analyzing late SEC filings for differential impacts of IS and accounting issues'.. Int. J. Account. Inf. Syst., 11 (3): 211-213 (2010)