Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A methodology for using GitLab for software engineering learning analytics., , , , , , and . CHASE@ICSE, page 3-6. IEEE / ACM, (2019)Errors and Poor Practices of Software Engineering Students in Using Git., , , , , , and . CEP, page 8:1-8:4. ACM, (2020)Developing an online programme in computational biology., and . Briefings Bioinform., 14 (6): 775-783 (2013)Efficient Extraction of Macromolecular Complexes from Electron Tomograms Based on Reduced Representation Templates., , and . CAIP (1), volume 9256 of Lecture Notes in Computer Science, page 423-431. Springer, (2015)On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GEANT Network., and . GLOBECOM, page 1-6. IEEE, (2009)SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms., , and . GLOBECOM, page 1-5. IEEE, (2010)Performance evaluation of path splicing on the GÉANT and the Sprint networks., , and . Comput. Networks, 55 (17): 3947-3958 (2011)Effect of Continuous Integration on Build Health in Undergraduate Team Projects., and . DEVOPS, volume 11350 of Lecture Notes in Computer Science, page 169-183. Springer, (2018)Automated Speech Discrimination using Frequency Derivative Threshold Detection., and . ACIS-ICIS, page 1099-1103. IEEE Computer Society, (2007)Can MM-PBSA calculations predict the specificities of protein kinase inhibitors?, and . J. Comput. Chem., 27 (16): 1990-2007 (2006)