Author of the publication

First Examples of de Vries-like Smectic A to Smectic C Phase Transitions in Ionic Liquid Crystals

, , , , , , and . Chemphyschem, 17 (24): 4116-4123 (2016)
DOI: 10.1002/cphc.201600829

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A linear chemical notation., , , and . Computers & Chemistry, 8 (4): 233-237 (1984)A Compiler for a Linear Chemical Notation., , and . Computers & Chemistry, 15 (4): 337-342 (1991)Connections between fuzzy theory, simulated annealing, and convex duality., , and . Fuzzy Sets and Systems, 96 (3): 307-334 (1998)CNG und LNG aus biogenen Reststoffen – ein Konzept zur ressourcenschonenden Kraftstoffproduktion, , , , , , , , and . Chemie Ingenieur Technik, 92 (1-2): 144-155 (2020)The regional pressure impact of CO storage: a showcase study from the North German Basin, , , and . Environmental Earth Sciences, (2012)A compute unified system architecture for graphics clusters incorporating data locality, , , and . IEEE Transactions on Visualization and Computer Graphics, 15 (4): 605--617 (2009)First Examples of de Vries-like Smectic A to Smectic C Phase Transitions in Ionic Liquid Crystals, , , , , , and . Chemphyschem, 17 (24): 4116-4123 (2016)Outlining a Serious Moral Games in Bioethics., , , and . ICST Trans. Ambient Systems, 1 (3): e4 (2014)Performance limits of ultra-wideband basic modulation principles., , and . GLOBECOM, page 816-820. IEEE, (2001)Der rechtliche Schutz von Software: Aktuelle Fragen und Probleme - Ein Diskussionspapier des GI-Arbeitskreises Software-Schutz., , , , , , , , , and . Informatik Spektrum, 15 (2): 89-100 (1992)