Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying Compliance of Trusted Programs., , and . USENIX Security Symposium, page 321-334. USENIX Association, (2008)A Methodology for the Verification of a ``System on Chip''., , , , , , , , , and . DAC, page 574-579. ACM Press, (1999)Intranets: An Internet Inside the Organization.. Handbook of Electronic Commerce, Springer, (2000)Fortune 500 on the Web: The Road to Second-Level Effects.. HICSS (2), page 463-470. IEEE Computer Society, (1996)Track Introduction., and . HICSS, IEEE Computer Society, (2006)Internet and the Digital Economy: Track Introduction., and . HICSS, IEEE Computer Society, (2004)Jifclipse: development tools for security-typed languages., , and . PLAS, page 1-10. ACM, (2007)Two-Sided Value-Based Music Artist Recommendation in Streaming Music Services., , and . HICSS, page 1-10. ScholarSpace, (2019)Introduction to Mining and Analyzing Social Media Minitrack.. HICSS, page 3108. IEEE Computer Society, (2013)Internet and the Digital Economy Introduction to the Track., and . HICSS, page 142. IEEE Computer Society, (2007)