Author of the publication

Case Study: Manipulating xor-OBDDs by Means of Signatures

, and . Universität Trier, Mathematik/Informatik, Forschungsbericht, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaboratecom Special Issue Analyzing Distributed Whiteboard Interactions., , and . Int. J. Cooperative Inf. Syst., 21 (3): 199-220 (2012)Separating the Eraser Turing Machine Classes L_e, NL_e, co-NL_e and P_e., , and . Theor. Comput. Sci., 86 (2): 267-275 (1991)The Nonuniform Complexity Classes NC, L and NL.. Elektronische Informationsverarbeitung und Kybernetik, 23 (10/11): 545-558 (1987)Symbolic Simulation of Synchronous Parallel Systems.. Elektronische Informationsverarbeitung und Kybernetik, 22 (7/8): 355-370 (1986)A Functional Description of Synchronous Systems.. Elektronische Informationsverarbeitung und Kybernetik, 21 (4/5): 231-235 (1985)openHPI - A case-study on the emergence of two learning communities., , , , , and . EDUCON, page 1323-1331. IEEE, (2013)Hot spot detection - An interactive cluster heat map for sentiment analysis., , , , , and . DSAA, page 1-9. IEEE, (2015)From Reputation Models and Systems to Reputation Ontologies., and . IFIPTM, volume 358 of IFIP Advances in Information and Communication Technology, page 98-116. Springer, (2011)Dynamic scalability and contention prediction in public infrastructure using Internet application profiling., , and . CloudCom, page 208-216. IEEE Computer Society, (2012)Security in Tele-Lab - Protecting an online virtual lab for security training., , , and . ICITST, page 1-7. IEEE, (2009)