Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defining the role of common variation in the genomic and biological architecture of adult human height, , , , , , , , , and 794 other author(s). Nat. Genet., 46 (11): 1173--1186 (November 2014)Genome-wide association and HLA fine-mapping studies identify risk loci and genetic pathways underlying allergic rhinitis, , , , , , , , , and 78 other author(s). Nat Genet, 50 (8): 1072-1080 (2018)A negative result for Büchi's automata.. Bulletin of the EATCS, (1983)A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, , , , and . Applications of Data Mining in Computer Security, Kluwer, (2002)An extension of the notions of traces and of asynchronous automata.. RAIRO Theor. Informatics Appl., (1991)Finite Transition Systems. Prentice Hall, (1994)Efficient methods to compute long range interactions for soft matter systems, and . Advanced Computer Simulation Approaches for Soft Matter Sciences II, volume II of Advances in Polymer Sciences, Springer, Berlin, (2005)MMM1D: A method for calculating electrostatic interactions in 1D periodic geometries, and . J. Chem. Phys., 123 (12): 144103 (September 2005)Attraction and unbinding of like--charged rods, , , and . Europhys. Lett., (2004)Recognizable sets of finite bilabelled transition systems.. Acta Cybern., 9 (4): 333-347 (1990)