Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The expanding role of primary care in cancer control, , , , , , , , , and 26 other author(s). Lancet Oncol, 16 (12): 1231-1272 (September 2015)Multiple-Valued Programmable Logic Array Minmization by Simulated Annealing., , , and . ISMVL, page 66-74. IEEE Computer Society, (1992)Evaluation of design methodologies., , , , , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 7 (1): 56-69 (1982)Analysing Requirements to Detect Latent Security Vulnerabilities., , and . SERE (Companion), page 168-175. IEEE, (2014)Discovering Potential Interaction Violations among Requirements., and . CAiSE Workshops, volume 249 of Lecture Notes in Business Information Processing, page 243-253. Springer, (2016)