Author of the publication

Launching Cosmic ray-driven Outflows from the magnetized interstellar medium

, , , , , , , , , , , , and . (2015)cite arxiv:1509.07247Comment: 7 pages, 5 figures, submitted, comments welcome.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TreeCol: a novel approach to estimating column densities in astrophysical simulations, , and . (2011)cite arxiv:1109.3861 Comment: 11 pages, 10 figures, submitted to MNRAS.The stellar IMF at very low metallicities, , , and . (2012)cite arxiv:1203.6842Comment: 11 pages, 10 figues, submitted to ApJ. arXiv admin note: text overlap with arXiv:1101.4891.Launching Cosmic ray-driven Outflows from the magnetized interstellar medium, , , , , , , , , and 3 other author(s). (2015)cite arxiv:1509.07247Comment: 7 pages, 5 figures, submitted, comments welcome.The IMF as a function of supersonic turbulence, , , , and . (2016)cite arxiv:1608.01306Comment: 12 pages, 7 figures, accepted by MNRAS.Launching Cosmic ray-driven Outflows from the magnetized interstellar medium, , , , , , , , , and 3 other author(s). (Sep 24, 2015)Formation and evolution of primordial protostellar systems, , , , , , , and . (2012)cite arxiv:1202.5552Comment: 17 pages, 13 figures, submitted to MNRAS, movies of the simulations may be downloaded at http://www.mpa-garching.mpg.de/~tgreif.SImulating the LifeCycle of molecular Clouds (SILCC): II. Dynamical evolution of the supernova-driven ISM and the launching of outflows, , , , , , , , , and 1 other author(s). (2015)cite arxiv:1508.06646Comment: 26 pages, submitted to MNRAS, comments welcome.MYSEA: the monterey security architecture., , , , , , , and . STC, page 39-48. ACM, (2009)A security architecture for transient trust., , , and . CSAW, page 1-8. ACM, (2008)Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture., , , , , , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 133-152. Springer, (2009)