Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Modeling wireless sensor networks using random graph theory, and . Physica A: Statistical Mechanics and its Applications, 387 (12): 3008--3016 (May 1, 2008)Search Engines for Semantic Web Knowledge, and . Proceedings of XTech 2006: Building Web 2.0, (May 2006)An Ensemble Learning and Problem Solving Architecture for Airspace Management., , , , , , , , , and 27 other author(s). IAAI, AAAI, (2009)Relative Localization Systems and Algorithms for Wireless Sensor Networks., , and . ICNSC, page 1439-1444. IEEE, (2008)Organizing Committee., , , and . AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0, AAAI, (2009)Explaining Semantic Web applications, , , , , and . (2009)On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework., , , , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 157-160. AAAI, (2005)owl:sameAs and Linked Data: An Empirical Study, , , and . (April 2010)