Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensembl 2005, , , , , , , , , and 42 other author(s). Nucleic Acids Research, (2005)Search for lensing signatures in the gravitational-wave observations from the first half of LIGO-Virgo's third observing run, , , , , , , , , and 1369 other author(s). (2021)cite arxiv:2105.06384Comment: main paper: 16 pages and 5 figures; total with appendices: 30 pages and 6 figures.Optimizing cost-sensitive trust-negotiation protocols., , , and . INFOCOM, page 1431-1442. IEEE, (2005)A System to Generate Test Data and Symbolically Execute Programs. CU-CS-060-75. U. of Colorado, Dep. of Computer Sci., (1975)Observation of gravitational waves from two neutron star-black hole coalescences, , , , , , , , , and 1592 other author(s). (2021)cite arxiv:2106.15163.Alignment of 1000 Genomes Project reads to reference assembly GRCh38, , , , , , and . Gigascience, 6 (7): 1-8 (July 2017)Reduced body protein in children with spastic quadriplegic cerebral palsy., , , , , , , , and . Am J Clin Nutr, 83 (3): 613--618 (March 2006)Genomic analysis of the origins and evolution of multicentric diffuse lower-grade gliomas, , , , , , , , , and 10 other author(s). Neuro Oncol, (October 2017)Continuous user authentication using multi-modal biometrics., , , and . Comput. Secur., (2015)Power to the people? The evolving recognition of human aspects of security., and . Comput. Secur., 31 (8): 983-988 (2012)