Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Sloan Digital Sky Survey Quasar Catalog: twelfth data release, , , , , , , , , and 36 other author(s). (2016)cite arxiv:1608.06483Comment: Accepted for publication in A&A. The catalog is publicly available here: http://www.sdss.org/dr12/algorithms/boss-dr12-quasar-catalog.Constraints from Ly-$\alpha$ forests on non-thermal dark matter including resonantly-produced sterile neutrinos, , , , , , and . (2017)cite arxiv:1706.03118Comment: 23 pages, submitted to JCAP.Simulating intergalactic gas for DESI-like small scale Lyman\alpha forest observations, , , , , and . (2020)cite arxiv:2012.04008Comment: 36 pages, 17 figures, submitted to JCAP.The impact of AGN feedback on the 1D power spectra from the Ly$\alpha$ forest using the Horizon-AGN suite of simulations, , , , , , and . (2020)cite arxiv:2002.02822Comment: Submitted to MNRAS.Quality improvement mechanism for cyber physical systems - An evaluation., , , , , , , , , and 1 other author(s). J. Softw. Evol. Process., (2020)Integration of Heterogeneous Tools to a Seamless Automotive Toolchain., , and . EuroSPI, volume 543 of Communications in Computer and Information Science, page 51-62. Springer, (2015)Impact Maximisation of Collaborative Projects Through Informal Leadership., , , , , and . PRO-VE, volume 662 of IFIP Advances in Information and Communication Technology, page 115-123. Springer, (2022)Automated Generation of AUTOSAR Description File for Safety-Critical Software Architectures., , and . GI-Jahrestagung, volume P-232 of LNI, page 2145-2156. GI, (2014)Engineering of Runtime Safety Monitors for Cyber-Physical Systems with Digital Dependability Identities., , , , , , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 3-17. Springer, (2020)SAHARA: a security-aware hazard and risk analysis method., , , , and . DATE, page 621-624. ACM, (2015)