Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Scalability of Genetic Algorithms to Very Large-Scale Feature Selection., and . EvoWorkshops, volume 1803 of Lecture Notes in Computer Science, page 77-86. Springer, (2000)Hunting in the enterprise: Forensic triage and incident response., and . Digital Investigation, 10 (2): 89-98 (2013)Umsetzung einer ökologieorientierten Unternehmungspolitik. Schriftenreihe des Instituts für Betriebswirtschaftliche Forschung an der Universität Zürich Haupt, Bern u.a., (1996)Towards Automated OCT-based Identification of White Brain Matter., , , , and . Bildverarbeitung für die Medizin, page 414-418. Springer, (2007)Limits of Static Analysis for Malware Detection., , and . ACSAC, page 421-430. IEEE Computer Society, (2007)Extending the domain of definition of functional series for nonlinear systems.. Autom., 32 (8): 1233-1234 (1996)A scalable file based data store for forensic analysis., , and . Digit. Investig., (2015)«iMake-IT»: Invent, Code, and Shape Your World!: A workshop live stream from a science communication project where 5th grade students work in a makerspace on open-ended projects., , , , , and . FabLearn/MakeEd, page 23:1-23:3. ACM, (2021)High K u materials approach to 100 Gbits/in 2, , , , , , , , and . IEEE Transactions on Magnetics, 36 (1): 10--15 (2000)PoX: Protecting users from malicious Facebook applications., , , and . Comput. Commun., 35 (12): 1507-1515 (2012)