Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Role of Microblogging in OSS Knowledge Management.. OSS, volume 404 of IFIP Advances in Information and Communication Technology, page 140-152. Springer, (2013)User strategies for handling information tasks in webcasts., , , and . CHI Extended Abstracts, page 1343-1346. ACM, (2005)Assessing tools for use with webcasts., , , and . JCDL, page 79-88. ACM, (2005)Quantum MMIC: future and applications in RF circuits., , , , , , and . ICECS, page 53-56. IEEE, (2000)Review of Physics Results from the Tevatron: Heavy Flavor Physics, and . (Dec 16, 2014)De-identified Bayesian personal identity matching for privacy-preserving record linkage despite errors: development and validation., , , and . BMC Medical Informatics Decis. Mak., 23 (1): 85 (December 2023)Using subgoal chaining to address the local minimum problem.. University of St Andrews, UK, (2002)British Library, EThOS.The personal sensor network: a user-centric monitoring solution., , , , and . BODYNETS, page 24. ICST, (2007)Identifying vulnerabilities and critical requirements using criminal court proceedings., , , and . SAC, page 355-359. ACM, (2009)Neural Steering: Diffcult and Impossible Sequential Problems for Gradient Descent., , and . IWANN (1), volume 2084 of Lecture Notes in Computer Science, page 442-449. Springer, (2001)