Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure., , , , and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 201-212. Springer, (2009)Trust in the Pi-Calculus., and . PPDP, page 103-114. ACM, (2001)The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues., , , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 119-133. Springer, (2006)Redesigning consent forms and processes for health research.. IPCC, page 1-2. IEEE, (2012)Freeform surface induction from projected planar curves via neural networks., , , , and . ESANN, page 641-646. (2006)Performance Analysis of Indoor 5G NR Systems., , , , , and . CCNC, page 632-633. IEEE, (2024)CS/SE Instructors Can Improve Student Writing without Reducing Class Time Devoted to Technical Content: Experimental Results., , , , , , and . ICSE (2), page 455-464. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Seven Types of Privacy., , and . European Data Protection, Springer, (2013)A Smart Vision Sensor for Detecting Risk Factors of a Toddler's Fall in a Home Environment., , and . ICNSC, page 656-661. IEEE, (2007)Smart Home Technology Adoption and Learning.. ProComm, page 93-96. IEEE, (2019)