Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Testing Safety-Critical Software., , and . Great Lakes Symposium on VLSI, page 180-183. IEEE Computer Society, (1999)EECCP: an energy-efficient coverage- and connectivity preserving algorithm under border effects in wireless sensor networks., , , , and . WTS, page 310-315. IEEE, (2008)Pseudo-Coloring Occlusion Culling., and . AsiaSim (3), volume 325 of Communications in Computer and Information Science, page 323-331. Springer, (2012)Adaptive control of uncertain Hammerstein systems with non-monotonic input nonlinearities using auxiliary nonlinearities., and . ACC, page 4915-4920. IEEE, (2013)Kinematics analysis of a 6-DOF selectively actuated parallel manipulator., , and . RAM, page 231-236. IEEE, (2004)Theorizing a Two-Sided Adoption Model for Mobile Marketing Platforms., , , and . ICIS, page 128. Association for Information Systems, (2010)Paradoxical cultural categories and paradoxical social relationships: The case of cooperation and competition., , , and . CogSci, cognitivesciencesociety.org, (2013)Constrained Portfolio Optimisation: The State-of-the-Art Markowitz Models., , and . ICORES, page 388-395. SciTePress, (2016)In memory of Clive L. Dym., , and . AI EDAM, 30 (4): 333-334 (2016)A method for describing the syntax and semantics of UML statecharts., , and . Software and Systems Modeling, 3 (2): 150-163 (2004)