Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measured the concerns of the business community lately?, and . SIGUCCS, page 111-118. ACM, (1994)Cooperative adaptive control of a two-agent system., , , and . Int. J. Control, 86 (1): 127-138 (2013)Testing the disaster recovery plan., and . Inf. Manag. Comput. Secur., 3 (1): 21-27 (1995)Inverse Kinematics and Sensitivity Minimization of an n-Stack Stewart Platform., , and . CoRR, (2018)Use of a Multiplexed CMOS Microarray to Optimize and Compare Oligonucleotide Binding to DNA Probes Synthesized or Immobilized on Individual Electrodes., , , , , and . Sensors, 10 (8): 7371-7385 (2010)Multiplexed Electrochemical Detection of Yersinia Pestis and Staphylococcal Enterotoxin B using an Antibody Microarray., , , , and . Sensors, 10 (4): 3351-3362 (2010)Inverse Kinematics and Sensitivity Minimization of an n-Stack Stewart Platform., , and . IROS, page 6794-6799. IEEE, (2019)Optimisation of client trust by evolutionary learning of financial planning strategies in an agent based model., , , , and . Congress on Evolutionary Computation, page 856-863. IEEE, (2005)White paper on cybersecurity in the healthcare sector. The HEIR solution., , , , , , , , , and 22 other author(s). CoRR, (2023)Preprocessing of GNSS signals subject to interference., and . Int. J. Satell. Commun. Netw., 15 (6): 247-257 (1997)