Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PDR-Code Comparison Study, , , , , , , , , and 14 other author(s). (2007)cite arxiv:astro-ph/0702231 Comment: 28 pages, 16 figures, see all benchmark data under: http://www.ph1.uni-koeln.de/pdr-comparison.Architectures and technologies for the globally integrated enterprise., , , and . IBM J. Res. Dev., 53 (6): 1 (2009)Creating a common ground for URI meaning using socially constructed web sites. Proceedings of Identity, Reference, and the Web Workshop (IMW06), (2006)Authenticated Encryption.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Getting and Using Context: Functional Constraints on the Organization of Knowledge, and . Proceedings of the Fourth Annual Conference of the Cognitive Science Society, page 44--46. Hillsdale, NJ: Erlbaum, (1982)A Comparison Between a Rule-Based and a TBL-Based Approach for Temporal Element Extraction., and . RANLP Text Mining Workshop, page 68-74. (2005)VoIP over cdma2000 1xEV-DO revision A., , , , , , and . IEEE Communications Magazine, 44 (2): 50-57 (2006)Optical Flow Estimation using a Spatial Pyramid Network., and . CoRR, (2016)Summarization of videotaped presentations: automatic analysis of motion and gesture., , , and . IEEE Trans. Circuits Syst. Video Techn., 8 (5): 686-696 (1998)Interference Cancellation Techniques for CDMA2000 1x Reverse Link., , , , and . GLOBECOM, page 1-5. IEEE, (2009)