Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elliptic Curve Cryptography in Practice., , , , , and . IACR Cryptology ePrint Archive, (2013)A network assisted vehicle for ADAS and ITS testing., , , and . ITSC, page 681-685. IEEE, (2011)Elliptic Curve Cryptography in Practice., , , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 157-175. Springer, (2014)Explaining Deep Learning Models with Constrained Adversarial Examples., , and . PRICAI (1), volume 11670 of Lecture Notes in Computer Science, page 43-56. Springer, (2019)An Ontology-Based Interactive System for Understanding User Queries., , , , and . ESWC, volume 11503 of Lecture Notes in Computer Science, page 330-345. Springer, (2019)Cloud computing concept for Intelligent Transportation Systems., , , and . ITSC, page 391-936. IEEE, (2011)Knowledge-based process management - an approach to handling adaptive workflow., , , , , and . Knowl.-Based Syst., 16 (3): 149-160 (2003)What Right Do You Have To Do That?-Infusing Adaptive Workflow Technology with Knowledfe about the Organisational and Autority Context of a Task., , , , and . ICEIS, page 240-247. (1999)Who Does What? Matching Agents to Tasks in Adaptive Workflow., , , , and . ICEIS, page 181-185. (2000)TreeMos: a high-throughput phylogenomic approach to find and visualize phylogenetic mosaicism., and . Bioinformatics, 24 (5): 717-718 (2008)