Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating learning contexts with mobile devices, , , , and . 1, page 55-74. WLE Centre for Excellence, (2007)Reducing Society's Vulnerability as Computers and Networks Proliferate.. IFIP Congress (2), volume A-13 of IFIP Transactions, page 554-563. North-Holland, (1992)Bacloffen (Lioresal) in the long-term management of spasticity., and . Med J Aust, 1 (18): 654--657 (May 1976)Agreement rate initialized maximum likelihood estimator for ensemble classifier aggregation and its application in brain-computer interface., , , , and . SMC, page 724-729. IEEE, (2016)Efficient Labeling of EEG Signal Artifacts Using Active Learning., , , and . SMC, page 3217-3222. IEEE, (2015)SECURATE - Security evaluation and analysis using fuzzy metrics., , and . AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 531-540. AFIPS Press, (1978)Parsimonious Identification of Physiological Indices for Monitoring Cognitive Fatigue., and . HCI (16), volume 5638 of Lecture Notes in Computer Science, page 495-503. Springer, (2009)Reasoning About Truth in First-Order Logic., , , and . J. Log. Lang. Inf., 22 (1): 115-137 (2013)Bugging the Digital Network.. Inf. Secur. J. A Glob. Perspect., 1 (4): 12-15 (1993)Risk analysis and computer security: Towards a theory at last.. Comput. Secur., 8 (1): 23-24 (1989)