Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chaos-hyperchaos transition, , , and . Chaos, Solitons & Fractals, 5 (10): 2003--2011 (October 1995)Cooperative organization of bacterial colonies: from genotype to morphotype, , and . Annu. Rev. Microbiol., (1998)Anomaly detection in three dimensional data based on Gauss Markov random field modeling, and . 2004 23rd IEEE Convention of Electrical and Electronics Engineers in Israel, page 448-451. (September 2004)Perturbation calculations for the spin up problem using REDUCE., and . SYMSACC, page 133-135. ACM, (1976)On-line sales recording system., , and . IRE-ACM-AIEE Computer Conference (Eastern), page 251-256. ACM, (1957)Accuracy control in the RCA Bizmac system., , and . IRE-AIEE-ACM Computer Conference (Western), page 202-206. ACM, (1957)Network Forensics.. Handbook of Research on Computational Forensics, Digital Crime, and Investigation, IGI Global, (2010)Surgical approach to salivary drooling in cerebral palsy., and . Pa Med, 82 (9): 35--38 (September 1979)A Domain Strategy for Computer Program Testing., and . IEEE Trans. Software Eng., 6 (3): 247-257 (1980)Source attribution for network address translated forensic captures.. Digital Investigation, 5 (3-4): 138-145 (2009)