Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-to-peer secure updates for heterogeneous edge devices., , , and . NOMS, page 1-5. IEEE, (2018)Formalising Configuration Languages: Why is this Important in Practice?, and . LISA, page 145-146. USENIX Association, (2014)Planning Configuration Relocation on the BonFIRE Infrastructure., and . CloudCom (2), page 164-169. IEEE Computer Society, (2013)978-0-7695-5095-4.Improvement in Language Detection by Neural Discrimination in Comparison with Predictive Models.. ICANN (2), volume 3697 of Lecture Notes in Computer Science, page 805-810. Springer, (2005)Grouping Text Lines in Freeform Handwritten Notes., , , , and . ICDAR, page 367-373. IEEE Computer Society, (2005)Context-dependent encoding of fear and extinction memories in a large-scale network model of the Basal amygdala., , , , and . PLoS computational biology, 7 (3): e1001104+ (Mar 17, 2011)Influence of PoS on the accuracy translation from Indonesian to interlingua., , and . ICEEI, page 1-6. IEEE, (2011)Analysis of The Relationship Between Students' Reading Habits and Students' Ability to Answer Reading Literacy Questions., , and . ICLIQE, page 21:1-21:4. ACM, (2021)The role of exploratory movement in visual servoing without calibration., , and . Robotics Auton. Syst., 23 (3): 153-169 (1998)A Review of the Development, Assessments, Success Driving Factors of Teacher's Research Competencies., , , and . ICLIQE, page 3:1-3:6. ACM, (2021)