Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-Centric Evaluation Framework for IT Services., , , , , and . GPC, volume 10232 of Lecture Notes in Computer Science, page 736-747. (2017)Ami - The chemist's amanuensis., , , , , , , , and . J. Cheminformatics, (2011)The International Mouse Phenotyping Consortium Web Portal, a unified point of access for knockout mice and related phenotyping data., , , , , , , , , and 23 other author(s). Nucleic Acids Research, 42 (Database-Issue): 802-809 (2014)On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks., , , , , and . AINA, page 634-641. IEEE Computer Society, (2015)Domain Independent Event Analysis for Log Data Reduction., , and . COMPSAC, page 225-232. IEEE Computer Society, (2012)TMIXT: A process flow for Transcribing MIXed handwritten and machine-printed Text., , , , , , , , and . BigData, page 2986-2994. IEEE, (2018)Airline Application Security in the Digital Economy: Tackling Security Challenges for Distributed Applications in Lufthansa Systems., , , , , , , , , and . Digitalization Cases, Springer, (2019)Data Is the New Currency., and . NSPW, page 105-116. ACM, (2014)Minimizing message complexity of partially replicated data on hypercubes., , , and . Networks, 28 (2): 87-95 (1996)A Lower Bound on the Probability of Conflict Under Nonuniform Access in Database Systems., , , and . Algorithmica, 13 (3): 283-312 (1995)