From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks., , , и . SecureComm, том 96 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 1-18. Springer, (2011)Sensitive detection of somatic point mutations in impure and heterogeneous cancer samples, , , , , , , , , и . Nature Biotechnology, 31 (3): 213--219 (2013)Software Technology at NeXT Computer., , , и . USENIX Summer, стр. 313. USENIX Association, (1991)New results on binary linear codes. CoRR, (1995)New binary linear codes which are dual transforms of good codes., и . IEEE Trans. Inf. Theory, 45 (6): 2136-2137 (1999)A Brief Tour of Split Linear Programming.. AAECC, том 1255 из Lecture Notes in Computer Science, стр. 164-173. Springer, (1997)The Making of "Widlife": Species of Interaction., и . ICMC, Michigan Publishing, (1992)Techniques for Note Identification in Polyphonic Music., , , , и . ICMC, Michigan Publishing, (1985)A Synthesizer Debugger.. ICMC, Michigan Publishing, (1983)Demonstration: Using SynthBuilder for the Creation of Physical Models., , , и . ICMC, Michigan Publishing, (1996)