Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A RISC architecture with uncompromised digital signal processing and microcontroller operation., and . ICASSP, page 3097-3100. IEEE, (1998)The conticomputer system a commodities database.. SIGMINI, page 35-39. ACM, (1978)Near real-time analytics with IBM DB2 analytics accelerator., , , and . EDBT, page 579-588. ACM, (2013)Basic Strategy for some Simplified Blackjack Variants., and . CoRR, (2024)On the Choice Between Graph-Based and Block-Structured Business Process Modeling Languages., , , and . MobIS, volume P-141 of LNI, page 59-72. GI, (2008)A micro-debugger for Eclipse computers.. ACM-SE, page 8-10. ACM, (1978)Power station coal use: prospects to 2000. IEACR IEA Coal Research, London, (1991)Improving music composition through peer feedback: experiment and preliminary results., , and . AInF@IJCAI, volume 1407 of CEUR Workshop Proceedings, page 27-31. CEUR-WS.org, (2015)TrustZone Explained: Architectural Features and Use Cases., , , , and . CIC, page 445-451. IEEE Computer Society, (2016)SOEDA: A Methodology for Specification and Implementation of Applications on a Service-Oriented Event-Driven Architecture, , , and . Proceedings of the 12th International Conference on Business Information Systems (BIS 2009). Poznan, Poland April 27-29, 2009., volume 21 of Lecture Notes in Business Information Processing, page 193--204. Poznan, Poland, Springer Verlag, (April 2009)