Author of the publication

Ökonomische und ökonometrische Analyse der Bewertung von Optionen unter stochastischer Volatilität

. ZEW-Wirtschaftsanalysen Nomos-Verl.-Ges., Baden-Baden, 1. Aufl. edition, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing LCI Data from Different Workgroups within the same Instance of an LCA Database., , , and . EnviroInfo, page 507-515. Shaker Verlag, Aachen, (2012)1. E-Business-Award-Projekt der Fachhochschule Ludwigshafen am Rhein - Hochschule für Wirtschaft., , and . Wirtschaftsinf., 42 (6): 560-562 (2000)Core Concepts in Peer-to-Peer Networking, , and . Peer to Peer Computing: The Evolution of a Disruptive Technology, chapter 1, Idea Group Inc., (2005)A Domain-Specific Language and Source-to-Source Compilation Framework for Geometric Multigrid Methods.. University of Erlangen-Nuremberg, Germany, (2019)Labor and Love: Wives' Employment and Divorce Risk in its Socio-Political Context, , , , , , , , , and 5 other author(s). Social Politics: International Studies in Gender, State & Society, 20 (4): 482-509 (2013)(ISSP).Towards a Search Driven System Architecture for Environmental Information Portals., , , , and . ISESS, volume 448 of IFIP Advances in Information and Communication Technology, page 351-360. Springer, (2015)SYCL Code Generation for Multigrid Methods., , , and . SCOPES, page 41-44. ACM, (2019)Control of an Overactuated Nanopositioning System with Hysteresis by Means of Control Allocation., , , and . AMC, page 280-287. IEEE, (2021)Nutzerzentrierte Konzeption und frameworkbasierte Entwicklung von gestengesteuerten Anwendungen im AAL-Umfeld., , , , , and . GI-Jahrestagung, volume P-220 of LNI, page 116-118. GI, (2013)A Model for Structuring and Reusing Security Requirements Sources and Security Requirements., and . REFSQ Workshops, volume 1342 of CEUR Workshop Proceedings, page 34-43. CEUR-WS.org, (2015)