Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where's Alice?: Applied Kid Crypto Meets Provable Security., , , , and . WPES@CCS, page 117-121. ACM, (2020)About quasi-kernels in a digraph., and . Discret. Math., 154 (1-3): 279-280 (1996)Information-Centric Adoption and Use of Standard Compliant DevSecOps for Operational Technology: From Experience to Design Principles., , , and . ICSOB, volume 500 of Lecture Notes in Business Information Processing, page 400-415. Springer, (2023)Rule requirements for product ontologies., and . Rule Languages for Interoperability, W3C, (2005)Characterization of JWST science performance from commissioning, , , , , , , , , and 601 other author(s). (2022)cite arxiv:2207.05632Comment: 60 pages, 30 figures.BioSimulators: a central registry of simulation engines and services for recommending specific tools., , , , , , , , , and 65 other author(s). Nucleic Acids Res., 50 (W1): 108-114 (2022)BioSimulators: a central registry of simulation engines and services for recommending specific tools., , , , , , , , , and 61 other author(s). CoRR, (2022)Towards a Model for the Detection of Firearms using Machine Learning Algorithms: A Case Study., , , , , , , , , and . CITI, volume 1873 of Communications in Computer and Information Science, page 3-13. Springer, (2023)High Performance Reactive Fluid Flow Simulations Using Adaptive Mesh Refinement on Thousands of Processors., , , , , , , , , and 3 other author(s). SC, page 56. IEEE Computer Society, (2000)A Dynamic Hybrid Resource Provisioning Approach for Running Large-Scale Computational Applications on Cloud Spot and On-Demand Instances., , , , , , , and . ICPADS, page 657-662. IEEE Computer Society, (2013)