Author of the publication

Pressure dependence of pentyl nitrate formation from the OH radical-initiated reaction of n-pentane in the presence of NO

, , and . Journal of Physical Chemistry A, 110 (21): 6617--6622 (June 2006)046SO Times Cited:3 Cited References Count:38.
DOI: Doi 10.1021/Jp054643i

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pressure dependence of pentyl nitrate formation from the OH radical-initiated reaction of n-pentane in the presence of NO, , and . Journal of Physical Chemistry A, 110 (21): 6617--6622 (June 2006)046SO Times Cited:3 Cited References Count:38.Molecular identification using flow cytometry histograms and information theory., , , , , , , , , and . AMIA, AMIA, (2001)Principal components in time-series modelling., , and . ECC, page 1705-1710. IEEE, (1999)A 2D Fully Convolutional Neural Network for Nearshore And Surf-Zone Bathymetry Inversion from Synthetic Imagery of Surf-Zone using the Model Celeris., , , , , , and . AAAI Spring Symposium: MLPS, volume 2587 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Formal Verification of Type Flaw Attacks in Security Protocols.. APSEC, page 415-424. IEEE Computer Society, (2003)Therapeutically increasing MHC-I expression potentiates immune checkpoint blockade, , , , , , , , , and 23 other author(s). Cancer Discovery, (2021)Exposure of Loggerhead Sea Turtle Nests to Waves in the Florida Panhandle., , , and . Remote. Sens., 13 (14): 2654 (2021)CoBRA: Containerized Bioinformatics Workflow for Reproducible ChIP/ATAC-seq Analysis., , , , , , , , , and 5 other author(s). Genom. Proteom. Bioinform., 19 (4): 652-661 (2021)Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z.. ZB, volume 3455 of Lecture Notes in Computer Science, page 319-333. Springer, (2005)Security in Depth through Smart Space Cascades.. ACISP, volume 6812 of Lecture Notes in Computer Science, page 226-240. Springer, (2011)