Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A social approach to security: Using social networks to help detect malicious web content., , and . ISKE, page 436-441. IEEE, (2010)Simulation of Electron-Proton Scattering Events by a Feature-Augmented and Transformed Generative Adversarial Network (FAT-GAN)., , , , , , , , , and 2 other author(s). IJCAI, page 2126-2132. ijcai.org, (2021)MARS - machine automated response system.. SIGUCCS, page 16-20. ACM, (1993)Monolithic 3D integration of SRAM and image sensor using two layers of single grain silicon., , , , , and . 3DIC, page 1-4. IEEE, (2010)Designing and selecting components for nucleic acid computers., , , and . DNA Based Computers, volume 54 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 183-193. DIMACS/AMS, (1999)Closed-form deflection-limiting commands., and . ACC, page 2104-2109. IEEE, (2005)Experimental verification of saturation reducing, zero vibration command shapers.. ACC, page 4939-4944. IEEE, (2009)Transient deflection performance measures for command shapers.. ACC, page 3251-3256. IEEE, (2008)TuringTool: A User Interface to Aid in the Software Maintenance Task., , and . IEEE Trans. Software Eng., 16 (3): 294-301 (1990)Robust analytic deflection-limiting commands., and . ACC, IEEE, (2006)