Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New methods for lost voice packet recovery in active networks., , and . ICON, page 57-62. IEEE, (2003)Comparing the Cost of Caring for Medicare Beneficiaries in Federally Funded Health Centers to Other Care Settings, , , , , and . (2015)MRI-SPECT image registration using multiple MR pulse sequences to examine osteoarthritis of the knee., , , , and . Medical Imaging: Image Processing, volume 3661 of SPIE Proceedings, SPIE, (1999)The vanishing firefly project: engaging citizen scientists with a mobile technology and real-time reporting framework., , , , , and . IWGS, page 85-92. ACM, (2014)Candidate subcircuits for functional module identification in logic circuits., , , and . ACM Great Lakes Symposium on VLSI, page 34-38. ACM, (2000)Integrating the heterogeneous control properties of software modules., and . SDE, page 99-108. ACM, (1992)Constant Time Interpretation for Shallow-bound Variables in the Presence of Mixed SPECIAL/LOCAL Declarations.. Symposium on LISP and Functional Programming, page 196-200. ACM, (1982)Discovery of a Ringlike Dark Matter Structure in the Core of the Galaxy Cluster Cl 0024+17, , , , , , , , , and 6 other author(s). (2007)Comparative Architecture Performance Analysis At Design Time., and . Int. CMG Conference, page 231-242. Computer Measurement Group, (2007)Education and Prevention Relationships on Security Incidents for Home Computers.. J. Comput. Inf. Syst., 55 (3): 29-37 (2015)