Author of the publication

Characterization of JWST science performance from commissioning

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and . (2022)cite arxiv:2207.05632Comment: 60 pages, 30 figures.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using quantified trust levels to describe authentication requirements in federated identity management., , and . SWS, page 71-80. ACM, (2008)TIOSA: Testing VM Interoperability at an OS and Application Level - A Hypervisor Testing Method and Interoperability Survey., , , , , , and . IC2E, page 245-252. IEEE Computer Society, (2014)Modelling Security Goals in Business Processes., , and . Modellierung, volume P-127 of LNI, page 197-212. GI, (2008)A Declarative Recommender System for Cloud Infrastructure Services Selection., , , , and . GECON, volume 7714 of Lecture Notes in Computer Science, page 102-113. Springer, (2012)A Security Meta-model for Service-Oriented Architectures., and . IEEE SCC, page 251-259. IEEE Computer Society, (2009)Security Requirements Specification in Service-Oriented Business Process Management., , and . ARES, page 41-48. IEEE Computer Society, (2009)A Secure Web Services Providing Framework Based on Lock-Keeper., , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 375-384. Springer, (2007)Enhort: a platform for deep analysis of genomic positions., , , and . PeerJ Comput. Sci., (2019)NoPeak: k-mer-based motif discovery in ChIP-Seq data without peak calling., , , and . Bioinform., 37 (5): 596-602 (2021)Silicon Heart: An Easy to Use Interactive Real-Time Baroreflex Simulator., , , and . CinC, page 973-976. www.cinc.org, (2015)