Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Moving Objects Databases, and . Morgan Kaufmann Publishers, (2005)On distribution properties of sequences with perfect linear complexity profile.. Inf. Process. Lett., 74 (3-4): 175-182 (2000)A Note on the Construction and Upper Bounds of Correlation-Immune Functions.. IMACC, volume 1355 of Lecture Notes in Computer Science, page 295-306. Springer, (1997)3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data, , , and . book series publisher, (2011)Lean and Industry 4.0 - How to Develop a Lean Digitalization Strategy with the Value Stream Method., , and . ELEC, volume 122 of Lecture Notes in Networks and Systems, page 127-135. Springer, (2019)Structured Nonlinear Discriminant Analysis., , , and . ECML/PKDD (1), volume 13713 of Lecture Notes in Computer Science, page 38-54. Springer, (2022)Constant Time EXPected Similarity Estimation for Large-Scale Anomaly Detection., , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 12-20. IOS Press, (2016)How to Play Sherlock Holmes in the World of Mobile Agents., , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 449-463. Springer, (2002)A Method for Protecting Mobile Agents against Denial of Service Attacks., and . CIA, volume 2446 of Lecture Notes in Computer Science, page 297-311. Springer, (2002)A note on the security of code memo., and . Mobility Conference, page 261-267. ACM, (2007)