Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Filament bifurcations in a one-dimensional model of reacting excitable fluid flow, , and . Physica A: Statistical Mechanics and its Applications, 327 (1-2): 59--64 (Sep 1, 2003)How Gaussian competition leads to lumpy or uniform species distributions, , , and . Theoretical Ecology, 3 (2): 89--96 (May 1, 2010)Clustering, advection, and patterns in a model of population dynamics with neighborhood-dependent rates, and . Phys. Rev. E, 70 (1): 016216 (July 2004)Numerical studies of an interacting particle system and its deterministic description, and . Physica A: Statistical Mechanics and its Applications, 356 (1): 95--99 (Oct 1, 2005)Low-dimensional dynamical system model for observed coherent structures in ocean satellite data, and . Physica A: Statistical Mechanics and its Applications, 328 (1-2): 233--250 (Oct 1, 2003)Exploring New Ways of eTandem and Telecollaboration Through the WebRTC Protocol: Students' Engagement and Perceptions., and . Int. J. Emerg. Technol. Learn., 14 (5): 200-217 (2019)Reducing Streaming Cost While Increasing Privacy: A Case Study on a Smartphone and Chromecast Using Peer-to-Peer Technology to Skip Third-Party Servers., , , and . IEEE Consumer Electron. Mag., 8 (2): 50-55 (2019)An SDN approach to detect targeted attacks in P2P fully connected overlays., , , and . Int. J. Inf. Sec., 20 (2): 245-255 (2021)On mitigating pollution and free-riding attacks by Shamir's Secret Sharing in fully connected P2P systems., , and . IWCMC, page 711-716. IEEE, (2017)On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers., , , and . ISDA, volume 557 of Advances in Intelligent Systems and Computing, page 144-153. Springer, (2016)