Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Is the responsibilization of the cyber security risk reasonable and judicious?, , , , and . Comput. Secur., (2018)Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors., , , , , , , , and . CCC, page 144-150. IEEE, (2016)Optimising simulation data structures for the Xeon Phi., and . HPCS, page 364-371. IEEE, (2016)Architectures for persistence., and . Microprocess. Microsystems, 17 (3): 117-130 (1993)A Hardware Relaxation Paradigm for Solving NP-Hard Problems., , , , and . BCS Int. Acad. Conf., page 75-86. British Computer Society, (2008)Use of motion field warping to generate cardiac images., and . ACM Crossroads, 13 (4): 6 (2007)Hilbert Space Models Commodity Exchanges.. QI, volume 5494 of Lecture Notes in Computer Science, page 299-307. Springer, (2009)Design and verification of a highly concurrent machine., , , and . Microprocess. Microsystems, 16 (3): 115-123 (1992)Is Economic Planning Hypercomputational? The Argument from Cantor Diagonalisation., , and . Int. J. Unconv. Comput., 5 (3-4): 223-236 (2009)Physical constraints on hypercomputation., , and . Theor. Comput. Sci., 394 (3): 159-174 (2008)