Author of the publication

Dienstboten

, and . Exerzierfeld der Moderne: Industriekultur in Berlin im 19. Jahrhundert, volume 1 of Industriekultur deutscher Städte und Regionen, Beck, (1984)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Messung strömungsphysiologischer Größen der Netzhautzirkulation bei Diabetikern Typ I und Typ II: Measurement of flow physiology of the large vessels in retinal circulation in type 1 and type 2 diabetics, , , , , and . Graefe's Archive for Clinical and Experimental Ophthalmology, 220 (1): 42--46 (1983)Measurement of flow-physiologic parameters of retinal blood circulation in type 1 and 2 diabetics before and after photocoagulation, , , , , , , and . Graefe's Archive for Clinical and Experimental Ophthalmology, 223 (3): 154--157 (1985)Messungen strömungsphysiologischer Größen der Netzhautdurchblutung bei Normalpersonen: Measurement of flow physiology of the large vessels in retinal circulation in normal subjects, , , , , and . Graefe's Archive for Clinical and Experimental Ophthalmology, 220 (1): 39--41 (1983)A Meta-Modeling Concept for Embedded RT-Systems Design, , , , and . 14th Euromicro Conference on Real-Time Systems -- Work in Progress Session, (2002)Dienstboten, and . Exerzierfeld der Moderne: Industriekultur in Berlin im 19. Jahrhundert, volume 1 of Industriekultur deutscher Städte und Regionen, Beck, (1984)Optimal results for the computational completeness of gemmating (tissue) P systems., , and . Int. J. Found. Comput. Sci., 16 (5): 929-942 (2005)P colonies and prescribed teams., and . Int. J. Comput. Math., 83 (7): 569-592 (2006)Partial Halting in P Systems., and . Int. J. Found. Comput. Sci., 18 (6): 1215-1225 (2007)One-dimensional Array Grammars and P Systems with Array Insertion and Deletion Rules., , , and . MCU, volume 128 of EPTCS, page 62-75. (2013)How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack., , , and . IACR Cryptology ePrint Archive, (2015)