Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The quadratic hash method when the table size is a power of 2., and . Comput. J., 15 (4): 314-315 (1972)Expedited Breast Care: A New Model in Breast Health., , , , , , , , , and 1 other author(s). Digital Mammography / IWDM, volume 5116 of Lecture Notes in Computer Science, page 515-521. Springer, (2008)A Computational Study of the Kemeny Rule for Preference Aggregation., and . AAAI, page 697-702. AAAI Press / The MIT Press, (2004)Texture-Based Heuristics for Scheduling Revisited., , , and . AAAI/IAAI, page 241-248. AAAI Press / The MIT Press, (1997)Beyond Contention: Extending Texture-Based Scheduling Heuristics., , , and . AAAI/IAAI, page 233-240. AAAI Press / The MIT Press, (1997)Analytic Framework and Measurement Strategy for Investigating Optimal Staffing in Medical Practice., , , , and . Operations Research, 24 (5): 815-841 (1976)Environmental Public Goods Not Securable by Markets or Networks: A Partial Response to Scruton and Iannone.. IJT, 9 (2): 26-41 (2018)Open online platforms advancing DSP education., , , , and . ICASSP, page 8771-8775. IEEE, (2013)Characterizing errors in airborne laser altimetry data to extract soil roughness., , and . IEEE Trans. Geoscience and Remote Sensing, 42 (10): 2130-2141 (2004)Digital guidance of an unmanned battery electric vehicle.. Aston University, Birmingham, UK, (1983)British Library, EThOS.