Author of the publication

Experimental investigations on a model of a power plant flange under steady state and transient load

, , and . Materials at high temperatures, (2023)
DOI: 10.1080/09603409.2023.2278833

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ANTS - A Framework for Knowledge Based NAT Traversal., , and . GLOBECOM, page 1-6. IEEE, (2009)Bilateral and multilateral negotiation for agreement discovery and formation.. Technical University Munich, (2012)Behavior and classification of NAT devices and implications for NAT traversal., , and . IEEE Network, 22 (5): 14-19 (2008)Creep and Failure Behavior of Welded Joints Made of Alloy 617B, , and . Joint EPRI-123HiMAT International Conference on Advances in High-Temperature Materials, page 1123-1131. Materials Park, Ohio, ASM International, (2019)Damage Assessment of Similar Martensitic Welds Under Creep, Fatigue, and Creep-Fatigue Loading, , and . Journal of pressure vessel technology, 145 (4): 041502 (2023)Pluggable Authorization and Distributed Enforcement with pam_xacml., , , , and . KiVS, page 253-264. Springer, (2009)Automated Trust Negotiation in Autonomic Environments., , , , and . IWSOS, volume 4725 of Lecture Notes in Computer Science, page 272-279. Springer, (2007)Creep and Creep Crack Behavior of Alloy C-263 Used for Thick-Walled Components - An Update, , , and . Joint EPRI-123HiMAT International Conference on Advances in High-Temperature Materials, page 546-557. Materials Park, Ohio, ASM International, (2019)Preventing identity theft with electronic identity cards and the trusted platform module., , , and . EUROSEC, page 44-51. ACM, (2009)Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks., , , and . ESAS, volume 3313 of Lecture Notes in Computer Science, page 152-165. Springer, (2004)