Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The UCSC Archaeal Genome Browser: 2012 update., , , , and . Nucleic Acids Res., 40 (Database-Issue): 646-652 (2012)Computer conferencing systems: how do we support them?. SIGUCCS, page 21-25. ACM, (1987)Robust Digital Computation in the Physical World., , , , and . Cyber-Physical Systems Security, Springer, (2018)Serving the needs of administrative users: Pressure for change in traditional user services and administrative data processing roles and methods., and . SIGUCCS, page 153-161. ACM, (1982)Multidefender Security Games., , and . CoRR, (2015)Using our technology to help ourselves (abstract only).. SIGUCCS, page 93. ACM, (1986)Multidefender Security Games., , and . IEEE Intell. Syst., 32 (1): 50-60 (2017)Photonic Crystal Enhanced Quantum Dot Biosensor for Cancer-associated miRNA Detection., , , , , , , , , and 5 other author(s). IEEE SENSORS, page 1-4. IEEE, (2022)A first collective validation of global fluvial flood models for major floods in Nigeria and Mozambique, , , , , , , , , and 3 other author(s). Environmental Research Letters, 13 (10): 104007 (2018)Optical mark reading - making it easy for users.. SIGUCCS, page 257-263. ACM, (1981)