Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prediction of Growth Factor-Dependent Cleft Formation During Branching Morphogenesis Using A Dynamic Graph-Based Growth Model., , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 13 (2): 350-364 (2016)On anonymity in an electronic society: A survey of anonymous communication systems., and . ACM Comput. Surv., 42 (1): 5:1-5:35 (2009)Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture., and . CHES, volume 9813 of Lecture Notes in Computer Science, page 237-256. Springer, (2016)Networking security Guest Editorial., and . IEEE Netw., 13 (6): 10-11 (1999)Preserving proximity relations and minimizing edge-crossings in high dimensional graph visualizations., , , and . LDAV, page 131-132. IEEE Computer Society, (2011)A Combinatorial Approach to Measuring Anonymity., , and . ISI, page 356-363. IEEE, (2007)Analysis of Load-Balanced Switch with Finite Buffers., , , and . GLOBECOM, page 1524-1529. IEEE, (2008)AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing., , , , and . WOOT, USENIX Association, (2016)Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks., , and . ICC, page 2262-2267. IEEE, (2006)Topological Design of Loss-Free Switch-Based LANs., , and . INFOCOM, page 88-96. IEEE Computer Society, (1995)