Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some limitations of web of trust models.. Inf. Manag. Comput. Security, 6 (5): 218-220 (1998)Digital signatures and the future of documentation.. Inf. Manag. Comput. Security, 7 (2): 83-87 (1999)Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis., , , , , , , , and . ICME, page 893-896. IEEE Computer Society, (2006)A Comparison of Autotasking and Macrotasking in a Quantum Chemical Application Program on a Cray Y-MP Computer., and . Computers & Chemistry, 17 (4): 379-381 (1993)Heterogeneous Computing Machines and Amdahl's Law., , and . Parallel Computing, 22 (3): 407-413 (1996)Facebook's Challenge to the Collection Limitation Principle., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Role of Sb in the superconducting kagome metal CsV\textdollar\_3\textdollarSb\textdollar\_5\textdollar revealed by its anisotropic compression, , , , , , , and . SciPost Physics, (February 2022)Performance of IBM RISC System / 6000 Workstation Clusters in a Quantum Chemical Application., , and . Parallel Computing, 19 (9): 1053-1062 (1993)Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm., and . Parallel Computing, 23 (13): 2115-2127 (1997)alphacritical for Parallel Processors., , and . Parallel Computing, 21 (3): 467-471 (1995)