Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Groups are not always the same., , and . Comput. Support. Cooperative Work., 2 (4): 261-284 (1994)Automatic self-supervised learning of associations between speech and text., , and . INTERSPEECH, page 465-469. ISCA, (2013)IT phone home: the techno-institutional development of standards in the evolution of global cellular telephony (panel session)., , , and . ICIS, page 405-406. Association for Information Systems, (1998)A System for Information Management in BioMedical Studies - SIMBioMS., , , , , , , , , and 6 other author(s). Bioinform., 25 (20): 2768-2769 (2009)Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement., and . EISIC, page 198-203. IEEE, (2013)The usage of social media in crisis communication., , , and . CSCESM, page 13-18. IEEE, (2015)Building trust between citizens and their governments., , , , and . CSCESM, page 128-133. IEEE, (2015)Cyber Security and Trust., and . KMIS, page 397-404. SciTePress, (2015)Orchestrating Without Partiture.. HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)DeleGate: towards a conference diplomat's multidimensional workstation., , , and . HICSS (4), page 513-522. IEEE Computer Society, (1995)