Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pre-architectural performance estimation for ASIP design based on abstract processor models., , , , and . ICSAMOS, page 133-140. IEEE, (2014)Realistic Generation and Real Time Animation of Images of the Human Colon., , and . Comput. Graph. Forum, 11 (3): 367-379 (1992)The Challenge of Access Control Policies Quality., , , , and . ACM J. Data Inf. Qual., 10 (2): 6:1-6:6 (2018)ProFact: A Provenance-Based Analytics Framework for Access Control Policies., , , , , , and . IEEE Trans. Serv. Comput., 14 (6): 1914-1928 (2021)Reconfiguration in Source-Synchronous Receivers for Short-Reach Parallel Optical Links., , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 27 (7): 1548-1560 (2019)Dual-pairing summation by parts finite difference methods for large scale elastic wave simulations in 3D complex geometries., , and . J. Comput. Phys., (2022)Correction to: Toward online layer-wise surface morphology measurement in additive manufacturing using a deep learning-based approach., , , , , , and . J. Intell. Manuf., 34 (6): 2691 (August 2023)Assessing system of systems information security risk with OASoSIS., , , and . Comput. Secur., (2022)MIDP 2.0 changing the face of J2ME gaming., and . ACM Southeast Regional Conference, page 37-41. ACM, (2004)Linking Twitter Sentiment and Event Data to Monitor Public Opinion of Geopolitical Developments and Trends., , , , , and . SBP-BRiMS, volume 10354 of Lecture Notes in Computer Science, page 223-229. Springer, (2017)