Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer conferencing systems: how do we support them?. SIGUCCS, page 21-25. ACM, (1987)The UCSC Archaeal Genome Browser: 2012 update., , , , and . Nucleic Acids Res., 40 (Database-Issue): 646-652 (2012)Robust Digital Computation in the Physical World., , , , and . Cyber-Physical Systems Security, Springer, (2018)Multidefender Security Games., , and . CoRR, (2015)Serving the needs of administrative users: Pressure for change in traditional user services and administrative data processing roles and methods., and . SIGUCCS, page 153-161. ACM, (1982)Using our technology to help ourselves (abstract only).. SIGUCCS, page 93. ACM, (1986)Multidefender Security Games., , and . IEEE Intell. Syst., 32 (1): 50-60 (2017)Photonic Crystal Enhanced Quantum Dot Biosensor for Cancer-associated miRNA Detection., , , , , , , , , and 5 other author(s). IEEE SENSORS, page 1-4. IEEE, (2022)A first collective validation of global fluvial flood models for major floods in Nigeria and Mozambique, , , , , , , , , and 3 other author(s). Environmental Research Letters, 13 (10): 104007 (2018)Optical mark reading - making it easy for users.. SIGUCCS, page 257-263. ACM, (1981)