Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oyster-2: Bringing Type Theory into Practice.. IFIP Congress (1), volume A-12 of IFIP Transactions, page 49-56. North-Holland, (1992)Nominal Associative Anaphors - A Text-Based Analysis at the Semantics-Pragmatics Interface., and . DAARC, volume 7099 of Lecture Notes in Computer Science, page 108-118. Springer, (2011)Guest Editors' Preface., , and . J. Semant., 29 (4): 439-443 (2012)Enhanced infrastructure security through inter-level anomaly detection., and . IPCCC, page 1-2. IEEE Computer Society, (2013)Control of robots and machine tools with an extended factory cloud., , , and . WFCS, page 1-4. IEEE, (2015)Lehr- und Übungsbuch der Informatik. Band 2. Theorie der Informatik., , and . (2001)A privacy-aware distributed software architecture for automation services in compliance with GDPR., , and . ETFA, page 1067-1070. IEEE, (2018)PRoCeeD: Process State Prediction for CRITIS Using Process Inherent Causal Data and Discrete Event Models., and . CRITIS, volume 8985 of Lecture Notes in Computer Science, page 314-325. Springer, (2014)Feasibility of connecting machinery and robots to industrial control services in the cloud., and . ETFA, page 1-4. IEEE, (2016)The Oyster-Clam System., , , and . CADE, volume 449 of Lecture Notes in Computer Science, page 647-648. Springer, (1990)