Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

More on graph theoretic software watermarks: Implementation, analysis, and attacks., , , , and . Inf. Softw. Technol., 51 (1): 56-67 (2009)Graph-Based Approaches to Software Watermarking., , , and . WG, volume 2880 of Lecture Notes in Computer Science, page 156-167. Springer, (2003)Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks., , , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 192-207. Springer, (2004)Herbert Coblans: A Biography.. J. Documentation, 34 (4): 259-272 (1978)Self-Assessment Procedure XII: A Self-Assessment Procedure Dealing with Computer Architecture., and . Commun. ACM, 27 (1): 29-36 (1984)An introduction to applied multivariate statistics, and . North-Holland, New York u.a., (1983)Performance of High Breakdown Mixture Discriminant Analysis Under Different Biweight Functions., and . Commun. Stat. Simul. Comput., 36 (1): 177-183 (2007)Mass Communication Law and Policy Research and the Values of Free Expression. Journalism & Mass Communication Quarterly, 94 (3): 641--662 (2017)Penalized multinomial mixture logit model., and . Comput. Stat., 25 (1): 121-141 (2010)Transparent microprogramming in support of abstract type oriented dynamic vertical migration., and . MICRO, page 165-178. ACM/IEEE, (1984)