Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DFT-Based QM-MM Approach Designed for the Treatment of Large Molecular Systems: Application to Chorismate Mutase, , , , , and . J. Phys. Chem. B, 107 (49): 13728--13736 (December 2003)Application of a Real Time Expert System Platform for Flexible Autonomous Transport in Industrial Production Computers in Industry, , , , , , , and . (1999)STORK e-privacy and security., , , , , and . NSS, page 234-238. IEEE, (2011)Semantic Overlay Networks for P2P Systems, and . Technical report, Computer Science Department, Stanford University, (2002)Study of Traffic Imbalance in Subscriber Matrices, , and . page 1-7. (1979)Selecting the toroidal self-organizing feature maps (TSOFM) best organized to object recognition., , and . ICNN, page 1341-1346. IEEE, (1997)Electro-thermal modeling of multifinger AlGaN/GaN HEMT device operation including thermal substrate effects., and . Microelectron. Reliab., 48 (1): 45-50 (2008)Multiple-Steering QM-MM Calculation of the Free Energy Profile in Chorismate Mutase, , , and . J. Am. Chem. Soc., 127 (19): 6940--6941 (May 2005)Wearable Potentiometric Sensors for Medical Applications., , and . Sensors, 19 (2): 363 (2019)Predicting sentencing outcomes with centrality measures., , , and . Secur. Informatics, 2 (1): 4 (2013)