From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Novel Attacks on Spread-Spectrum Fingerprinting.. EURASIP J. Information Security, (2008)Separating and Intersecting Properties of BCH and Kasami Codes., и . IMACC, том 2898 из Lecture Notes in Computer Science, стр. 52-65. Springer, (2003)Hierarchical Task Analysis, Situation-Awareness And Support Software., , , и . ECMS, стр. 184-190. European Council for Modeling and Simulation, (2013)Intelligent Computer-Automated Crane Design Using An Online Crane Prototyping Tool., , , , и . ECMS, стр. 564-573. European Council for Modeling and Simulation, (2016)Forord til NIK 2015.. NIK, Bibsys Open Journal Systems, Norway, (2015)Quiz for diskusjon og samarbeid i store klasser., и . NIK, Bibsys Open Journal Systems, Norway, (2018)A universal control architecture for maritime cranes and robots using genetic algorithms as a possible mapping approach., , , , и . ROBIO, стр. 322-327. IEEE, (2013)Upper Bounds on Separating Codes., и . IEEE Trans. Inf. Theory, 50 (6): 1291-1295 (2004)Matematikk er eit pratefag og andre røynsler frå eit omvendt klasserom.. NIK, Bibsys Open Journal Systems, Norway, (2015)Model-driven Software Engineering in Practice: A Content Analysis Software for Health Reform Agreements., , , и . EUSPN/ICTH, том 63 из Procedia Computer Science, стр. 545-552. Elsevier, (2015)