Author of the publication

Size dependent electronic properties of silicon quantum dots - An analysis with hybrid, screened hybrid and local density functional theory.

, , , , , and . Comput. Phys. Commun., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing networks using game theory: algorithms and applications.. AAMAS, page 1345-1346. IFAAMAS, (2011)Reliability of Hybrid Functionals in Predicting Band Gaps, , and . Phys. Rev. Lett., 107 (21): 216806 (November 2011)Mixed-Initiative Optimization in Security Games: A Preliminary Report., , , and . AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, AAAI, (2011)Computing optimal randomized resource allocations for massive security games., , , , , and . AAMAS (1), page 689-696. IFAAMAS, (2009)Game theory for security: Key algorithmic principles, deployed systems, lessons learned., , , and . Allerton Conference, page 1822-1829. IEEE, (2012)An output structure for a bi-modal 6.4-Gbps GDDR5 and 2.4-Gbps DDR3 compatible memory interface., , , , , and . CICC, page 1-4. IEEE, (2011)End-to-end available bandwidth: measurement methodology, dynamics, and relation with TCP throughput., and . SIGCOMM, page 295-308. ACM, (2002)Security Games with Arbitrary Schedules: A Branch and Price Approach., , , , and . AAAI, page 792-797. AAAI Press, (2010)Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty., , , and . AAAI, page 758-763. AAAI Press, (2011)Addressing Execution and Observation Error in Security Games., , , and . Applied Adversarial Reasoning and Risk Modeling, volume WS-11-06 of AAAI Technical Report, AAAI, (2011)