Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Usage Control Policy Enforcement in OpenOffice.org and Information Flow., , , and . ISSA, page 393-406. ISSA, Pretoria, South Africa, (2009)Crowdsourcing-Plattformen. Web 2.0 und Social Media in der Unternehmenspraxis. Grundlagen, Anwendungen und Methoden mit zahlreichen Fallstudien, chapter 2.8, Oldenbourg-Verlag, München, 3., überarb. und erw. Auflage edition, (2012)A Common Semantics Representation for SDL and TTCN., , , and . PSTV, volume C-8 of IFIP Transactions, page 335-346. North-Holland, (1992)Infering an ontology of single cell motions from high-throughput microscopy data., , , , , and . ISBI, page 160-163. IEEE, (2015)Monitors for Usage Control., , , , and . IFIPTM, volume 238 of IFIP, page 411-414. Springer, (2007)Easy Teach & Learn: A Web-Based Adaptive Middleware for Creating Virtual Classrooms., , and . HPCN Europe, volume 1823 of Lecture Notes in Computer Science, page 531-534. Springer, (2000)Interference Effects of Shallow Buried Targets on a GPR., , and . IGARSS, page 4360-4363. IEEE, (2023)Streetlights affect moth orientation beyond flight-to-light behaviour, , , , , , , , , and 2 other author(s). (October 2022)Segmentation of Color Fundus Images of the Human Retina: Detection of the Optic Disc and the Vascular Tree Using Morphological Techniques., and . ISMDA, volume 2199 of Lecture Notes in Computer Science, page 282-287. Springer, (2001)Runtime monitoring for next generation Java ME platform., , , , and . Comput. Secur., 29 (1): 74-87 (2010)