Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Repeated polyketide synthase modules involved in the biosynthesis of a heptaene macrolide by Streptomyces sp. FR-008., , , , , , and . Mol Microbiol, 14 (1): 163--172 (October 1994)A bit-level systolic implementation of the median filter., and . Microprocess. Microsystems, 19 (4): 185-186 (1995)Snow moving to higher elevations: Analyzing three decades of snowline dynamics in the Alps, , , , , , , and . Geophysical Research Letters, (2020)Search for a light pseudoscalar Higgs boson in the dimuon decay channel in pp collisions at √s = 7 TeV, , , , , , , , , and 2183 other author(s). Phys Rev Lett, 109 (12): 121801-121801 (September 2012)A Persuasive Approach for Urging Construction Workers to Behave Safely., , , , , and . IEEM, page 284-288. IEEE, (2023)Battery-powered, Wireless MEMS Sensors for High-Sensitivity Chemical and Biological Sensing., , , , , , , , , and 7 other author(s). ARVLSI, page 359-368. IEEE Computer Society, (1999)Estrogen-regulated genes predict survival in hormone receptor-positive breast cancers, , , , , , , , and . J Clin Oncol, 24 (11): 1656-1664 (April 2006)Analyzing networks with VisANT, , and . Curr Protoc Bioinformatics, (December 2004)Identification of filter management strategy in fluid power systems under uncertainty: an interval-fuzzy parameter integer nonlinear programming method., , , , and . Int. J. Syst. Sci., 42 (3): 429-448 (2011)On the security of HY-key authentication scheme., , , and . Comput. Commun., 22 (8): 739-741 (1999)