Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evidence for Network Evolution in an Arabidopsis Interactome Map, , , , , , , , , and 55 other author(s). Science, 333 (6042): 601--607 (Jul 29, 2011)Independently Evolved Virulence Effectors Converge onto Hubs in a Plant Immune System Network, , , , , , , , , and 25 other author(s). Science, 333 (6042): 596--601 (Jul 29, 2011)Elliptic Curve Cryptography in Practice., , , , , and . IACR Cryptology ePrint Archive, (2013)Exploiting AI Technologies to Realise Adaptive Workflow Systems, , , , and . (July 1999)A System for Medical Information Extraction and Verification from Unstructured Text., , , , and . AAAI, page 13314-13319. AAAI Press, (2020)Ensemble Learning using Error Correcting Output Codes: New Classification Error Bounds., , , , , , and . ICTAI, page 719-723. IEEE, (2021)A network assisted vehicle for ADAS and ITS testing., , , and . ITSC, page 681-685. IEEE, (2011)Explaining Deep Learning Models with Constrained Adversarial Examples., , and . PRICAI (1), volume 11670 of Lecture Notes in Computer Science, page 43-56. Springer, (2019)An Ontology-Based Interactive System for Understanding User Queries., , , , and . ESWC, volume 11503 of Lecture Notes in Computer Science, page 330-345. Springer, (2019)Elliptic Curve Cryptography in Practice., , , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 157-175. Springer, (2014)