Author of the publication

Crime Hotspots: An Evaluation of the KDE Spatial Mapping Technique.

, , and . EISIC, page 69-74. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Cloud Masking for the Generation of CM SAF Cloud Climate Data Records from AVHRR and SEVIRI Sensors., , , , and . Remote. Sens., 12 (4): 713 (2020)Assessment of business process information security., and . Int. J. Bus. Process. Integr. Manag., 3 (2): 118-130 (2008)Linear Scan Register Allocation in a High-Performance Erlang Compiler., and . PADL, volume 2257 of Lecture Notes in Computer Science, page 101-119. Springer, (2002)Atomistic Simulation Studies of Polymers and Water., and . PARA, volume 4699 of Lecture Notes in Computer Science, page 59-65. Springer, (2006)The development of the HiPE system: design and experience report., , , and . Int. J. Softw. Tools Technol. Transf., 4 (4): 421-436 (2003)Megavariate analysis of hierarchical QSAR data., , , , and . J. Comput. Aided Mol. Des., 16 (10): 711-726 (2002)Network modeling of the transcriptional effects of copy number aberrations in glioblastoma., , , , , , , , , and 3 other author(s). Molecular systems biology, (Apr 26, 2011)Profile-guided optimization across process boundaries., and . Dynamo, page 23-31. ACM, (2000)Assessment of Enterprise Information Security - The Importance of Information Search Cost., , and . HICSS, IEEE Computer Society, (2006)Heap architectures for concurrent languages using message passing., , and . MSP/ISMM, page 195-206. ACM, (2002)