Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges in Bioinformatics Workflows for Processing Microbiome Omics Data at Scale., , , , , , , , , and 18 other author(s). Frontiers Bioinform., (2021)Improving Peer Review with ACORN: ACO Algorithm for Reviewer's Network., and . ANTS, volume 7461 of Lecture Notes in Computer Science, page 260-267. Springer, (2012)Leveraging Ontologies within the National Microbiome Data Collaborative., , , , , , , , , and 38 other author(s). ICBO, volume 3073 of CEUR Workshop Proceedings, page 141-143. CEUR-WS.org, (2021)Measuring the attack surfaces of two FTP daemons., , , and . QoP, page 3-10. ACM, (2006)A Computational Study of the Role of Spike Broadening in Synaptic Facilitation of Hermissenda., , , and . Journal of Computational Neuroscience, 15 (1): 29-41 (2003)Neurally-Based Algorithms for Image Processing., , and . AIPR, page 79-85. IEEE Computer Society, (2004)Role of A-type K+ channels in spike broadening observed in soma and axon of Hermissenda type-B photoreceptors: A simulation study., , , and . Journal of Computational Neuroscience, 21 (1): 89-99 (2006)The Effects of Profile Pictures and Friends' Comments on Social Network Site Users' Body Image and Adherence to the Norm.. Cyberpsy., Behavior, and Soc. Networking, 19 (4): 239-245 (2016)Adults with a severe-to-profound hearing impairment. investigating the effects of linguistic context on speech perception., , and . ICSLP, ISCA, (1998)Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System., , , and . HICSS, IEEE Computer Society, (2006)