Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Cloud Computing with Brokered Trusted Sensor Networks, , , and . -, (0)0 citation(s).Estimating meiotic gene conversion rates from population genetic data, , and . Genetics, 177 (2): 881-894 (October 2007)Sensitive detection of chromosomal segments of distinct ancestry in admixed populations, , , , , , , , , and . PLoS Genet, (June 2009)Can one learn history from the allelic spectrum?, , and . Theor Popul Biol, 73 (3): 342-348 (May 2008)A Large Hadron Electron Collider at CERN, , , , , , , , , and 198 other author(s). (Nov 20, 2012)Augmenting real data with synthetic data: an application in assessing Radio-Isotope identification algorithms., , , and . Quality and Reliability Eng. Int., 25 (8): 899-911 (2009)A second generation human haplotype map of over 3.1 million SNPs, , , , , , , , , and 241 other author(s). Nature, 449 (7164): 851-861 (October 2007)The Distributed and Interactive Courseware Environment (DICE)., , , , , and . FTDCS, page 76-84. IEEE Computer Society, (1995)SelfStabilizing Token Circulation on Anonymous Message Passing., and . OPODIS, page 115-128. Hermes, (1998)Principals of Corporate Finance, and . McGraw-Hill, New York, 7th edition, (2003)