Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deafness mutation mining using regular expression based pattern matching.. BMC Medical Informatics Decis. Mak., (2007)Improving Organizational Password Policy Compliance via Open Source Tools.. SERVICES, page 43-44. IEEE Computer Society, (2011)VNCCrack: A Tool for Auditing Corporate Environments for the Presence of Insecure VNC Installs., and . SERVICES, page 365-367. IEEE Computer Society, (2015)Interrelationship Between Protein Electrostatics and Evolution in HCV and HIV Replicative Proteins.. BIOCOMP, page 91-97. CSREA Press, (2007)ESPSim: A JAVA Application for Calculating Electrostatic Potential Map Similarity Scores., and . BIOCOMP, page 735-737. CSREA Press, (2008)Privacy-Preserving Mobile Accesses for Virtual Private Social Media., , , and . SERVICES, page 192-198. IEEE Computer Society, (2012)Petaflop Essay Contest., , , , and . Comput. Sci. Eng., 9 (6): 55-59 (2007)The Role of Protein Electrostatics in Facilitating the Catalysis of DEAD-box Proteins.. BIOCOMP, page 708-712. CSREA Press, (2008)Protein Stability Engineering in Staphylococcal Nuclease Using an AI-Neural Network Hybrid System and a Genetic Algorithm.. IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 935-942. Springer, (2006)IT Governance, Compliance and Auditing Curriculum-A Pedagogical Perspective., , , and . SERVICES, page 414-421. IEEE Computer Society, (2011)