Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authority and Level of Automation - Lessons to Be Learned in Design of In-vehicle Assistance Systems., , , , and . HCI (3), volume 8512 of Lecture Notes in Computer Science, page 413-424. Springer, (2014)The GMOC Model: Supporting Development of Systems for Human Control.. Uppsala University, Sweden, (2015)Moving Smart Contracts - A Privacy Preserving Method for Off-Chain Data Trust., , , , and . CoRR, (2022)Recognizing Complexity: Visualization for Skilled Professionals in Complex Work Situations., , , and . HCIV, volume 8345 of Lecture Notes in Computer Science, page 47-66. Springer, (2011)Solutions to the problem of inconsistent plans in railway traffic operation., , and . J. Rail Transp. Plan. Manag., 4 (4): 87-97 (2014)Model-based validation of QoS properties of biomedical sensor networks., , and . EMSOFT, page 69-78. ACM, (2008)Fostering Open Data Using Blockchain Technology., , , , , and . DIONE, volume 378 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 209-228. Springer, (2021)Credo Methodology: Modeling and Analyzing A Peer-to-Peer System in Credo., , , , , , , , , and 8 other author(s). TTSS, volume 266 of Electronic Notes in Theoretical Computer Science, page 33-48. Elsevier, (2009)Security in Distributed Systems by Verifiable Location-Based Identities., , , , and . CoRR, (2023)