Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Genome Polymorphism Detection Through Relaxed de Bruijn Graph Construction., , , , , , , and . BIBE, page 212-216. IEEE Computer Society, (2017)The YGuard access control model: set-based access control., , and . SACMAT, page 75-84. ACM, (2001)Analytical performance prediction on multicomputers., and . SC, page 886-894. ACM, (1993)Performance Prediction of PVM Programs., and . IPPS, page 803-807. IEEE Computer Society, (1996)A Performance Broker for CORBA., , and . HPDC, page 19-26. IEEE Computer Society, (1999)Application of a MAX-CUT Heuristic to the Contig Orientation Problem in Genome Assembly., , , , , and . BCB, page 476. ACM, (2013)Parallel Algorithm and Processor Selection Based on Fuzzy Logic., , , and . HPCN Europe, volume 1593 of Lecture Notes in Computer Science, page 440-449. Springer, (1999)Feedback Regulation of Immune Response to Maximum Exercise in Gulf War Illness., , , , , and . BCB, page 124-129. ACM, (2019)On the use of cartographic projections in visualizing phylo-genetic tree space., , and . Algorithms Mol. Biol., (2010)Core Algorithms of the Maui Scheduler., , and . JSSPP, volume 2221 of Lecture Notes in Computer Science, page 87-102. Springer, (2001)