Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single-cell RNA-seq supports a developmental hierarchy in human oligodendroglioma, , , , , , , , , and 28 other author(s). Nature, 539 (7628): 309-313 (November 2016)The 1.28 GHz MeerKAT DEEP2 Image, , , , , , , , , and 94 other author(s). (2019)cite arxiv:1912.06212Comment: 20 pages, 18 figures. Accepted for publication in ApJ.Should the Optional Property Construct be Used in Conceptual Modeling? A Theory and Three Empirical Tests, , , and . Information Systems Research, 12 (4): 384--405 (2001)Neural Network-longitudinal assessment of the Electronic Anti-Retroviral THerapy (EARTH) Cohort to follow response to HIV-treatment., , , , , , , and . AMIA, AMIA, (2005)A Computational Economy for IN Load Control Using a Multi-Agent System., , , and . J. Netw. Syst. Manag., 8 (3): 397-417 (2000)IN Load Control Using a Competitive Market-Based Multi-agent System., , , and . IS&N, volume 1774 of Lecture Notes in Computer Science, page 239-254. Springer, (2000)An automated process for compiling dataflow graphs into reconfigurable hardware., , , , , , , and . IEEE Trans. Very Large Scale Integr. Syst., 9 (1): 130-139 (2001)A model for the detection of the message stream delay attack., and . SEC, volume 54 of IFIP Conference Proceedings, page 438-451. Chapman & Hall, (1996)A comprehensive security system - the concepts, agents and protocols., , and . Comput. Secur., 9 (7): 631-643 (1990)A timestamp model for determining real-time communications in intelligent networks., and . Comput. Commun., 20 (4): 211-218 (1997)