From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , и 730 other автор(ы). Cell Systems, 6 (3): 271--281.e7 (марта 2018)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , и 730 other автор(ы). Cell Systems, 6 (3): 271--281.e7 (марта 2018)International network of cancer genome projects., , , , , , , , , и 406 other автор(ы). Nature, 464 (7291): 993--998 (апреля 2010)Protocols Using Keys from Faulty Data (Transcript of Discussion).. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 180-187. Springer, (2001)Last Orders.. Security Protocols Workshop, том 3957 из Lecture Notes in Computer Science, стр. 324. Springer, (2004)Rapid MODIS-based detection of tree cover loss., , , и . Int. J. Appl. Earth Obs. Geoinformation, (2018)Protocols Using Keys from Faulty Data.. Security Protocols Workshop, том 2467 из Lecture Notes in Computer Science, стр. 170-179. Springer, (2001)Hardware security risk assessment: A case study., и . HOST, стр. 179-184. IEEE Computer Society, (2016)The Petascale DTN Project: High Performance Data Transfer for HPC Facilities., , , , , , , , , и 6 other автор(ы). CoRR, (2021)Experiences in network and data transfer across large virtual organizations - a retrospective., , , , , и . PEARC, стр. 9:1-9:8. ACM, (2022)