Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Histopathological Image Classification based on Self-Supervised Vision Transformer and Weak Labels., , , , , and . CoRR, (2022)Agreements between Enterprises digitized by Smart Contracts in the Domain of Industry 4.0., , , and . CoRR, (2020)Sicherheitsprobleme für IT-Outsourcing durch Cloud Computing., , , and . HMD Prax. Wirtsch., (2011)subsequently labeled as volume 48 number 5 by Springer.Health Informatics Training Programs to Strengthen Health Workforce in Montenegro., , , , , , , and . ICIMTH, volume 305 of Studies in Health Technology and Informatics, page 596-599. IOS Press, (2023)Drawing and Analysis of Bounding Boxes for Object Detection with Anchor-Based Models., , and . SCIA (1), volume 13885 of Lecture Notes in Computer Science, page 359-373. Springer, (2023)Yeast cell segmentation in microstructured environments with deep learning., , , , and . Biosyst., (2022)Data Confidentiality In P2P Communication And Smart Contracts Of Blockchain In Industry 4.0., and . CoRR, (2020)CollaboCloud - Kollaborationsplattform in der Cloud., , and . DFN-Forum Kommunikationstechnologien, volume P-166 of LNI, page 23-32. GI, (2010)Towards a Self-protecting Cloud., and . OTM Conferences, volume 8185 of Lecture Notes in Computer Science, page 395-402. Springer, (2013)Resolving DRDoS Attack in Cloud Database Service Using Common Source IP and Incremental Replacement Strategy., , , , and . IntelliSys (2), volume 16 of Lecture Notes in Networks and Systems, page 725-737. Springer, (2016)