Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Analysis of Disulfide Bond Determination Using Computational-Predictive Methods and Mass Spectrometry-Based Algorithmic Approach., and . BIRD, volume 13 of Communications in Computer and Information Science, page 140-153. Springer, (2008)Facilitating message exchange though middle agents., , , and . AAMAS, page 561-562. ACM, (2002)An empirical evaluation of information security awareness levels in designing secure business processes., , and . DESRIST, ACM, (2009)The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research., and . DATA BASE, 49 (SI): 67-80 (2018)Discovering User Information Goals with Semantic Website Media Modeling., , and . MMM (1), volume 4351 of Lecture Notes in Computer Science, page 364-375. Springer, (2007)Distributed query plan generation using multi-objective ant colony optimisation., , and . Int. J. Artif. Intell. Soft Comput., 5 (3): 241-262 (2016)Distributed Query Plan Generation using Particle Swarm Optimization., , and . Int. J. Swarm Intell. Res., 4 (3): 58-82 (2013)Segmenting the Etiological Agent of Schistosomiasis for High-Content Screening., and . IEEE Trans. Medical Imaging, 32 (6): 1007-1018 (2013)Researchexplorer: gaining insights through exploration in multimedia scientific data., , and . Multimedia Information Retrieval, page 7-14. ACM, (2004)QUENTIN: reconstruction of disease transmissions from viral quasispecies genomic data., , , , , , , , , and 6 other author(s). Bioinform., 34 (1): 163-170 (2018)