Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's in a name? Why these proteins are intrinsically disordered: Why these proteins are intrinsically disordered, , , , , , , , , and 14 other author(s). Intrinsically Disord Proteins, 1 (1): e24157 (2013)An intrinsically disordered proteins community for ELIXIR, , , , , , , , , and 34 other author(s). F1000Res, (2019)Morphological Analysis from Images of Hyphal Growth using a Fractional Dynamic Model., and . TPCG, page 17-24. Eurographics Association, (2011)Space diversity reception techniques for the TETRA PMR system., and . ICECS, page 1597-1600. IEEE, (1999)The prediction switched diversity algorithm in TETRA system., , and . ESM, page 568-572. SCS Europe, (2000)Print protection using high-frequency fractal noise., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 446-454. SPIE, (2004)Using Quest3D to Develop VES: a Tool for Enhancing Electrical Safety and Design in the Built Environment., and . TPCG, page 29-35. Eurographics Association, (2012)Cryptography using artificial intelligence., , and . IJCNN, page 1-6. IEEE, (2015)On the fractal characteristics of Internet network traffic and its utilization in covert communications., , and . ICITST, page 1-6. IEEE, (2009)DECT wireless communication radio channel., and . ESM, page 573-577. SCS Europe, (2000)