From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , и 730 other автор(ы). Cell Systems, 6 (3): 271--281.e7 (марта 2018)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , и 730 other автор(ы). Cell Systems, 6 (3): 271--281.e7 (марта 2018)International network of cancer genome projects., , , , , , , , , и 406 other автор(ы). Nature, 464 (7291): 993--998 (апреля 2010)Rapid MODIS-based detection of tree cover loss., , , и . Int. J. Appl. Earth Obs. Geoinformation, (2018)Last Orders.. Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 324. Springer, (2004)Protocols Using Keys from Faulty Data (Transcript of Discussion).. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 180-187. Springer, (2001)Protocols Using Keys from Faulty Data.. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 170-179. Springer, (2001)Hardware security risk assessment: A case study., и . HOST, стр. 179-184. IEEE Computer Society, (2016)Experiences in network and data transfer across large virtual organizations - a retrospective., , , , , и . PEARC, стр. 9:1-9:8. ACM, (2022)The Petascale DTN Project: High Performance Data Transfer for HPC Facilities., , , , , , , , , и 6 other автор(ы). CoRR, (2021)