Author of the publication

ECMDA-FA ’09: Model driven architecture - foundations and applications: 5th European conference, ECMDA-FA 2009, Enschede, the Netherlands, June 23-26, 2009 ; proceedings

, , and (Eds.) volume 5562 of Lecture Notes in Computer Science, Berlin and New York, Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web communication services and the PacketIN® application hosting environment., , , , , , and . Bell Labs Tech. J., 7 (1): 25-40 (2002)Attention-deficit/hyperactivity disorder, , , , , , , , , and 2 other author(s). Nature Reviews Disease Primers, 10 (1): 11 (Feb 22, 2024)A Gypsy-Based Kernel.. S&P, page 219-225. IEEE Computer Society, (1984)On new security mechanisms for identity management: Recognizing and meeting telecom operator and enterprise needs., , , and . Bell Labs Tech. J., 15 (1): 95-113 (2010)4G LTE wireless solutions for DoD systems., , , and . MILCOM, page 2216-2221. IEEE, (2011)Sherlock: Commercial High Assurance Network Computing., , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 262-276. Springer, (2000)Defining the role of common variation in the genomic and biological architecture of adult human height, , , , , , , , , and 794 other author(s). Nat. Genet., 46 (11): 1173--1186 (November 2014)The infrared spectrum and structure of the type I complex of silver and DNA., , and . Nucleic Acids Res., 13 (1): 251-260 (1985)Modelling of friction stir welding for robotic implementation., , , and . Int. J. Model. Identif. Control., 1 (2): 101-106 (2006)