Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Programming Scala, and . O'Reilly Series O'Reilly Media, (2009)Okapi at TREC-4., , , , and . TREC, volume 500-236 of NIST Special Publication, National Institute of Standards and Technology (NIST), (1995)A Bayesian Framework for SNP Identification., , and . Pacific Symposium on Biocomputing, World Scientific, (2005)Pico Without Public Keys., , , , , , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 195-211. Springer, (2015)Can edentulous patients with orofacial dyskinesia be treated successfully with implants? A case report., and . J Dent Assoc S Afr, 51 (2): 67--70 (February 1996)The behavioural impact of a visually represented virtual assistant in a self-service checkout context., , and . BCS HCI, page 58-63. ACM, (2011)The association between antihypertensive treatment and serious adverse events by age and frailty: A cohort study, , , , , , , , , and 2 other author(s). 20 (4): e1004223 (2023)Stock transaction records on the Datatron 205.. IRE-ACM-AIEE Computer Conference (Eastern), page 183-186. ACM, (1957)Agile big data analytics: AnalyticsOps for data science., , and . IEEE BigData, page 2331-2339. IEEE Computer Society, (2017)An empirical study of matching grants: the `cap on CAP', , and . Journal of Public Economics, 72 (2): 269--288 (May 1, 1999)