Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pathway perturbations in signaling networks: Linking genotype to phenotype, , , , , and . Semin Cell Dev Biol, (March 2020)Revealing the Determinants of Widespread Alternative Splicing Perturbation in Cancer, , , , , , , , , and 6 other author(s). Cell Rep, 21 (3): 798--812 (October 2017)ITG-TEM turbulence simulation with bounce-averaged kinetic electrons in tokamak geometry., , , and . Comput. Phys. Commun., (2017)Finite grid instability and spectral fidelity of the electrostatic Particle-In-Cell algorithm., , , , , and . Comput. Phys. Commun., (2016)Reference Model and Key Technology Research for Human Factors Simulation in Manufacturing Systems, , , , and . Journal of Mechanical Engineering of China, 42 (3): 56–64 (2006)Fingerprint Based Secure Authentication Protocol using OTP in e-Banking., , , , and . Security and Management, page 541-546. CSREA Press, (2009)Graph Transformer Networks: Learning Meta-path Graphs to Improve GNNs., , , , , , , and . CoRR, (2021)Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation., , , , , , , and . ICHIT, volume 4413 of Lecture Notes in Computer Science, page 607-616. Springer, (2006)Security Protective Measures for the Ubiquitous City Integrated Operation Center., , , , and . BroadCom, page 239-244. IEEE Computer Society, (2008)Information security activities model per e-government service promotion stage., , and . iiWAS, page 223-227. ACM, (2010)