Author of the publication

IDH1 mutant malignant astrocytomas are more amenable to surgical resection and have a survival benefit associated with maximal surgical resection

, , , , , , , , , , , , , , , , and . Neuro Oncol, 16 (1): 81-91 (January 2014)
DOI: 10.1093/neuonc/not159

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hridaya A tele-medicine initiative for cardiovascular disease through convergence of grid, Web 2.0 and SaaS., , , and . PervasiveHealth, page 15-18. IEEE, (2008)Implementation of Virtualization Oriented Architecture: A Healthcare Industry Case Study., , , , and . IT Revolutions, volume 11 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 21-27. Springer, (2008)IDH1 mutant malignant astrocytomas are more amenable to surgical resection and have a survival benefit associated with maximal surgical resection, , , , , , , , , and 7 other author(s). Neuro Oncol, 16 (1): 81-91 (January 2014)Comparing the Performance of the Optical Glucose Assay Based on Glucose Binding Protein with High-Performance Anion-Exchange Chromatography with Pulsed Electrochemical Detection: Efforts to Design a Low-Cost Point-of-Care Glucose Sensor, , , , , and . J Diabetes Sci Technol, 1 (6): 864-872 (November 2007)Real-Time Software Implementation of H.264 Baseline Profile Video Encoder for Mobile and Handheld Devices., , , and . ICASSP (5), page 457-460. IEEE, (2006)Hydra: Leveraging functional slicing for efficient distributed SDN controllers., , , , , and . COMSNETS, page 251-258. IEEE, (2017)A hypermedia-based group decision support system to support collaborative medical decision-making., and . Decis. Support Syst., 30 (2): 187-216 (2000)Query processing in TREC-6., , , , and . Inf. Process. Manag., 36 (1): 179-186 (2000)Extracting Network-Wide Correlated Changes from Longitudinal Configuration Data., , , and . PAM, volume 5448 of Lecture Notes in Computer Science, page 111-121. Springer, (2009)Attacks of simple block ciphers via efficient heuristics., and . Inf. Sci., 177 (12): 2553-2569 (2007)