Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic Computing with Incremental Mindmaps to Manage and Mine Data Streams - Some Applications, , , , and . CoRR, (2009)On central black holes in ultra-compact dwarf galaxies, , , , , and . (2013)cite arxiv:1308.1398Comment: 16 pages, 8 figures, A&A in press.No Evidence for Significant Age Spreads in Young Massive LMC Clusters, , , and . (2015)cite arxiv:1501.02275Comment: 19 pages, 33 figures, accepted for publication in A&A.Constraining the escape fraction of ionizing photons from HII regions within NGC 300: A concept paper, , , and . (2016)cite arxiv:1606.01144Comment: 10 pages, 10 figures, accepted for publication in A&A.The formation of UCDs and massive GCs: Quasar-like objects for testing for a variable stellar initial mass function (IMF), , , , and . (2017)cite arxiv:1708.07127Comment: Accepted for publication in A&A, 12 pages, 10 figures + appendix.SANA - Security Analysis in Internet Traffic through Artificial Immune Systems., and . Trustworthy Software, volume 3 of OASIcs, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)Semi-automated Content Zoning of Spam Emails., , , , and . WEBIST (Selected Papers), volume 8 of Lecture Notes in Business Information Processing, page 35-44. Springer, (2007)Description of bad-signatures for network intrusion detection., and . ACSW, volume 54 of CRPIT, page 175-182. Australian Computer Society, (2006)CoZo - Content Zoning for Spam Emails., , , and . WEBIST (1), page 23-27. INSTICC Press, (2007)Artificial Cell Communication in Distributed Systems., and . AINA, page 1034-1041. IEEE Computer Society, (2008)