Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Search Engines for Semantic Web Knowledge, and . Proceedings of XTech 2006: Building Web 2.0, (May 2006)An analytical model of the overshooting effect for multiple-input gates in nanometer technologies., , , , and . ISCAS, page 1712-1715. IEEE, (2013)Differential multiuser detection using a novel genetic algorithm for ultra-wideband systems in lognormal fading channel., , , and . Journal of Zhejiang University - Science C, 12 (9): 754-765 (2011)Explaining Semantic Web applications, , , , , and . (2009)On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework., , , , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 157-160. AAAI, (2005)Organizing Committee., , , and . AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0, AAAI, (2009)owl:sameAs and Linked Data: An Empirical Study, , , and . (April 2010)Search on the Semantic Web., , , , , and . IEEE Computer, 38 (10): 62-69 (2005)