Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is Your Permutation Algorithm Unbiased for n ≠ 2 m ?, , , , and . PPAM (1), volume 7203 of Lecture Notes in Computer Science, page 297-306. Springer, (2011)Privacy-Preserving Whole-Genome Variant Queries., , , and . CANS, volume 11261 of Lecture Notes in Computer Science, page 71-92. Springer, (2017)Public security: simulations need to replace conventional wisdom., and . NSPW, page 115-124. ACM, (2011)SICOR: Subgraph Isomorphism Comparison of RNA Secondary Structures., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (6): 2189-2195 (2020)Genomische Daten und der Datenschutz., , , and . Datenschutz und Datensicherheit, 44 (2): 87-93 (2020)Fallzahlen, Re-Identifikation und der technische Datenschutz., , , , , , , and . Datenschutz und Datensicherheit, 46 (3): 143-148 (2022)Genetic algorithm niching by (Quasi-)infinite memory., , and . GECCO, page 296-304. ACM, (2021)Stochastic tunneling transformation during selection in genetic algorithm., and . GECCO, page 801-806. ACM, (2014)Protein Domain Phylogenies - Information Theory and Evolutionary Dynamics.. BIOINFORMATICS, page 114-122. INSTICC Press, (2010)TransferEntropyPT: An R Package to Assess Transfer Entropies via Permutation Tests., and . CMSB, volume 10545 of Lecture Notes in Computer Science, page 285-290. Springer, (2017)