Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel approach to counter denial of service attacks against transport network resources., , and . Bell Labs Tech. J., 14 (1): 219-242 (2009)Towards a security architecture for IP-based optical transmission systems., and . Bell Labs Tech. J., 16 (1): 133-153 (2011)Grammar-based Workload Modeling of Communication Systems, and . Modeling Techniques and Tools for Computer Performance Evaluation, Turin, (1991)Harmonising, Harvesting, and Searching Metadata Across a Repository Federation., , , , , , , , , and 4 other author(s). CoRDI, TIB Open Publishing, (2023)RADAR: Building a FAIR and Community Tailored Research Data Repository., , , , and . CoRDI, TIB Open Publishing, (2023)Hobbit, a care robot supporting independent living at home: First prototype and lessons learned., , , , , , , , , and 1 other author(s). Robotics Auton. Syst., (2016)Noise characterization of automotive auxiliary fan drives., , , and . Elektrotech. Informationstechnik, 137 (4): 235-241 (2020)Differences Between People Who Use Only Facebook and Those Who Use Facebook Plus Twitter., , , , and . Int. J. Hum. Comput. Interaction, 31 (2): 157-165 (2015)Using diffusion MRI data acquired with ultra-high gradient strength to improve tractography in routine-quality data., , , , , , , , , and 8 other author(s). NeuroImage, (2021)Why do people use Facebook?, and . Personality and Individual Differences, 52 (3): 243 - 249 (2012)