Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cognition: A Tool for Reinforcing Security in Software Defined Networks, , , , and . EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V, volume 288 of Advances in Intelligent Systems and Computing, Springer International Publishing, (2014)Smart Cards - the Personal Safe in an E-Commerce World., , and . International Conference on Internet Computing, page 343-346. CSREA Press, (2000)Measuring anonymity using network coordinate systems., , and . ISCIT, page 366-371. IEEE, (2011)Law-aware access control for international financial environments., and . MobiDE, page 33-40. ACM, (2009)System-level monitoring of floating-point performance to improve effective system utilization., , , , , , and . SC State of the Practice Reports, page 5:1-5:6. ACM, (2011)Controlled data collection of Mini-Sinks for maximizing packet delivery ratio and throughput using multiple paths in Wireless Sensor Networks., , and . PIMRC, page 758-764. IEEE, (2012)GCC2011 - 25 years of computational chemistry meetings., , and . J. Cheminformatics, 4 (S-1): 1 (2012)Law-Aware Access Control: About Modeling Context and Transforming Legislation., and . JSAI-isAI Workshops, volume 6284 of Lecture Notes in Computer Science, page 73-86. Springer, (2009)Johann Gasteiger - Germany's Pioneer in Chemoinformatics.. J. Chem. Inf. Model., 46 (6): 2191-2192 (2006)k-Pareto optimality for many-objective genetic optimization., , and . GECCO Companion, page 63-64. ACM, (2021)