From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Elements of visual language., и . VL, стр. 38-44. IEEE Computer Society, (1988)Perceptions of Risk in Mobile Transaction., , , и . IEEE Symposium on Security and Privacy Workshops, стр. 214-223. IEEE Computer Society, (2016)Security challenges for Enterprise Java in an e-business environment., , , , и . IBM Syst. J., 40 (1): 130-152 (2001)GROOP: An Object-Oriented Toolkit for Animated 3D Graphics., и . OOPSLA, стр. 309-325. ACM, (1993)SIGPLAN Notices 28(10) / OOPSLA'93, Addendum to the Proceedings: OOPS Messenger 5(2) April 1994.Validating structural properties of nested objects., , , , , , и . OOPSLA Companion, стр. 294-304. ACM, (2004)Access rights analysis for Java., , и . OOPSLA, стр. 359-372. ACM, (2002)SIGPLAN Notices 37(11).Biometric authentication on a mobile device: a study of user effort, error and task disruption., , , , , и . ACSAC, стр. 159-168. ACM, (2012)SABER: smart analysis based error reduction., , , , , , , и . ISSTA, стр. 243-251. ACM, (2004)Automatic detection of immutable fields in Java., , , и . CASCON, стр. 10. IBM, (2000)Practical out-of-band authentication for mobile applications., и . Middleware (Industry Track), стр. 3:1-3:6. ACM, (2013)