From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Symbolic Computing with Incremental Mindmaps to Manage and Mine Data Streams - Some Applications, , , , и . CoRR, (2009)On central black holes in ultra-compact dwarf galaxies, , , , , и . (2013)cite arxiv:1308.1398Comment: 16 pages, 8 figures, A&A in press.No Evidence for Significant Age Spreads in Young Massive LMC Clusters, , , и . (2015)cite arxiv:1501.02275Comment: 19 pages, 33 figures, accepted for publication in A&A.Constraining the escape fraction of ionizing photons from HII regions within NGC 300: A concept paper, , , и . (2016)cite arxiv:1606.01144Comment: 10 pages, 10 figures, accepted for publication in A&A.The formation of UCDs and massive GCs: Quasar-like objects for testing for a variable stellar initial mass function (IMF), , , , и . (2017)cite arxiv:1708.07127Comment: Accepted for publication in A&A, 12 pages, 10 figures + appendix.SANA - Security Analysis in Internet Traffic through Artificial Immune Systems., и . Trustworthy Software, том 3 из OASIcs, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2006)Symbolic Computing with Incremental Mind-maps to Manage and Mine Data Streams - Some Applications., , , , и . NeSy, том 366 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Description of bad-signatures for network intrusion detection., и . ACSW, том 54 из CRPIT, стр. 175-182. Australian Computer Society, (2006)CoZo - Content Zoning for Spam Emails., , , и . WEBIST (1), стр. 23-27. INSTICC Press, (2007)Semi-automated Content Zoning of Spam Emails., , , , и . WEBIST (Selected Papers), том 8 из Lecture Notes in Business Information Processing, стр. 35-44. Springer, (2007)