Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cyclic Algebra for the Synthesis of Ternary Digital Systems., , , and . IEEE Trans. Computers, 19 (7): 651-653 (1970)A Ternary Storage Element Using a Conventional Ferrite Core., , and . IEEE Trans. Electronic Computers, 14 (2): 248 (1965)Threshold implementation of ternary systems., , , and . IEEE Trans. Electronic Computers, 15 (4): 661-662 (1966)Practical On-Line Signature Verification., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 1180-1189. Springer, (2009)On the Use of Mobile Phones and Biometrics for Accessing Restricted Web Services., and . IEEE Trans. Syst. Man Cybern. Part C, 42 (2): 213-222 (2012)Client threshold prediction in biometric signature recognition by means of Multiple Linear Regression and its use for score normalization., , , and . Pattern Recognit., (2016)Adapting Reproducible Research Capabilities to Resilient Distributed Calculations., , , , , , and . Int. J. Grid High Perform. Comput., 8 (1): 58-69 (2016)Workflows orchestration in distributed computing infrastructures., , , , , , and . HPCS, page 616-622. IEEE, (2012)A Resilient Methodology for Accessing and Exploiting Data and Scientific Codes on Distributed Environments., , , , , , , , , and 3 other author(s). CSE, page 319-323. IEEE Computer Society, (2015)Executions of a Fusion Drift Kinetic Equation Solver on Grid., , , , , and . PDP, page 454-459. IEEE Computer Society, (2010)