Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Creation of Panoramic Augmented Reality Annotations on Mobile Phones, , , and . Pervasive Computing, IEEE, (2010)A Single Chip High Data Rate QPSK Demodulator., , and . ISCAS, page 2031-2034. IEEE, (1993)ConEx Crediting & Auditing, and . internet draft, accessible at http://tools.ietf.org/html/draft-wagner-conex-credit-00, (July 2013)A pedagogical implementation of A5/1, , and . (1998)http://jya.com/a51-pi.htm.Social Networks, , and . Handbook of Graph Drawing and Visualization, page 805--840. CRC Press, (2014)On Modularity Clustering, , , , , , and . Knowledge and Data Engineering, IEEE Transactions on, 20 (2): 172 -188 (February 2008)On modularity-np-completeness and beyond, , , , , , and . (2006)Maximizing Modularity is hard, , , , , , and . ArXiv Physics e-prints, (August 2006)A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities, , , and . Proc. Network and Distributed Systems Security Conference, page 3--17. ACM Press, (2000)Auditing of Congestion Exposure (ConEx) signals, and . (2013)