Author of the publication

PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities.

, , , and . USENIX Security Symposium, USENIX Association, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing change: lessons from five development projects., , , and . Int. J. Technol. Manag., 22 (1/2/3): 13-27 (2001)A New Concept for Managing One-of-a-kind Production., , and . One-Of-A-Kind Production, volume B-2 of IFIP Transactions, page 195-208. North-Holland, (1991)The servitisation of manufacturing function: empirical case studies., and . Int. J. Manuf. Technol. Manag., 30 (6): 369-391 (2016)Empirical testing of forecast update procedure for seasonal products., and . Int. J. Inf. Technol. Manag., 7 (1): 60-75 (2008)Management of automation and advanced manufacturing technology (AAMT) in the context of global manufacturing., , , , and . Int. J. Prod. Res., 55 (5): 1455-1458 (2017)Games in Production Management., , and . APMS, volume B-13 of IFIP Transactions, page 209-216. North-Holland, (1993)Computer Integrated Manufacturing: Empirical Implications for Industrial Information Systems., , , and . J. Manag. Inf. Syst., 12 (2): 59-82 (1995)An Indexing Scheme for Case-Based Manufacturing Vision Development., , and . ECCBR, volume 3155 of Lecture Notes in Computer Science, page 793-805. Springer, (2004)Business experience with computer integrated manufacturing. A survey of current strategy and practice., , , and . HICSS (4), page 970-979. IEEE Computer Society, (1995)Lean Maturity, Lean Sustainability., , , and . APMS, volume 246 of IFIP, page 371-378. Springer, (2007)