Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Public security: simulations need to replace conventional wisdom., and . NSPW, page 115-124. ACM, (2011)Is Your Permutation Algorithm Unbiased for n ≠ 2 m ?, , , , and . PPAM (1), volume 7203 of Lecture Notes in Computer Science, page 297-306. Springer, (2011)SICOR: Subgraph Isomorphism Comparison of RNA Secondary Structures., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (6): 2189-2195 (2020)Genomische Daten und der Datenschutz., , , and . Datenschutz und Datensicherheit, 44 (2): 87-93 (2020)Fallzahlen, Re-Identifikation und der technische Datenschutz., , , , , , , and . Datenschutz und Datensicherheit, 46 (3): 143-148 (2022)Privacy-Preserving Whole-Genome Variant Queries., , , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 71-92. Springer, (2017)Genetic algorithm niching by (Quasi-)infinite memory., , and . GECCO, page 296-304. ACM, (2021)Protein Domain Phylogenies - Information Theory and Evolutionary Dynamics.. BIOINFORMATICS, page 114-122. INSTICC Press, (2010)hoDCA: higher order direct-coupling analysis., and . BMC Bioinform., 19 (1): 546:1-546:5 (2018)Stochastic tunneling transformation during selection in genetic algorithm., and . GECCO, page 801-806. ACM, (2014)