Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Symbolic computation tools in scientific problem solving environments., , , , , , , , and . SIGSAM Bull., 31 (3): 58 (1997)Metaphor Detection with Topic Transition, Emotion and Cognition in Context., , , , , and . ACL (1), The Association for Computer Linguistics, (2016)Comprehensive Analysis of Alternative Splicing Across Tumors from 8,705 Patients, , , , , , , , , and 725 other author(s). Cancer Cell, 34 (2): 211--224.e6 (August 2018)Wireless Agents in Ad Hoc Networks., , , , , and . WRAC, volume 2564 of Lecture Notes in Computer Science, page 165-174. Springer, (2002)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Parameter Estimation for Constrained Context-Free Language Models., , , and . HLT, Morgan Kaufmann, (1992)Googlepedia: The Ultimate Google Resource (3rd Edition). Que, 3 edition, (2008)Translating standards into practice: one semantic web API for gene expression., , , , , , , , , and 1 other author(s). SWAT4LS, page 6-7. ACM, (2011)Scalable Open Science Approach for Mutation Calling of Tumor Exomes Using Multiple Genomic Pipelines, , , , , , , , , and 730 other author(s). Cell Systems, 6 (3): 271--281.e7 (March 2018)Symmetrische Verschlüsselungsverfahren. Design, Entwicklung und Kryptoanalyse klassischer und moderner Chiffren. Lehrbuch Teubner, Stuttgart u.a., 1. Aufl. edition, (2003)Verfasserangabe: Michael Miller ; Quelldatenbank: HBZ ; Format:marcform: print ; Umfang: X, 315 S. : graph. Darst..