2007 |
7 | EE | Jill Slay,
Michael Miller:
Lessons Learned from the Maroochy Water Breach.
Critical Infrastructure Protection 2007: 73-82 |
2002 |
6 | EE | Stephen Quirolgico,
L. Jay Wantz,
Michael Miller,
Naveen Srinivasan,
Vlad Korolev,
Michael Fay:
Wireless Agents in Ad Hoc Networks.
WRAC 2002: 165-174 |
1999 |
5 | EE | Michael Gurstein,
Peter Day,
Gert-Jan de Vreede,
Michael Miller,
Celia T. Romm,
Vanessa Whitehead:
Community informatics: international experiences and case studies (panel session).
ICIS 1999: 578-581 |
1998 |
4 | EE | Michael Miller,
L. Jay Wantz:
COOL Links: Ride the Wave.
Computer Networks 30(1-7): 663-665 (1998) |
3 | EE | L. Jay Wantz,
Michael Miller:
Educational Metadata in Use.
Computer Networks 30(1-7): 701-703 (1998) |
1995 |
2 | EE | Jainendra Kumar,
Noel R. Strader,
Jeff Freeman,
Michael Miller:
Emulation verification of the Motorola 68060.
ICCD 1995: 150- |
1 | | Michael Miller:
Context Shifts and Clashes in Dialogues: An Active Logic Perspective.
Fundam. Inform. 23(2/3/4): 355-370 (1995) |