Author of the publication

Two-dimensional Computation of the Three-dimensional Reachable Region for a Welding Head.

, and . CCCG, page 437-442. University of Waterloo, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Univ. -Prof. Dr. Michael Buchmeiser University of Stuttgart

Replication data of Buchmeiser group for: "Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes", , , , , , and . Dataset, (2024)Related to: M. R. Buchmeiser, D. Wang, R. Schowner, L. Stöhr, F. Ziegler, S. Sen, W. Frey,; Synthetic and Structural Peculiarities of Neutral and Cationic Molybdenum Imido and Tungsten Oxo Alkylidene Complexes Bearing Weakly Coordinating N-Heterocyclic Carbenes; Eur. J. Inorg. Chem., in press (2024). doi: 10.1002/ejic.202400082.
 

Other publications of authors with the same name

A peer-to-peer expressway over Chord., and . Mathematical and Computer Modelling, 44 (7-8): 659-677 (2006)Success factors of Business Intelligence.. MSR, IEEE Computer Society, (2009)Electrical-thermal co-analysis for power delivery networks in 3D system integration., , , , , , and . 3DIC, page 1-4. IEEE, (2009)Optimal Algorithms to Embed Trees in a Point Set., , and . Graph Drawing, volume 1027 of Lecture Notes in Computer Science, page 64-75. Springer, (1995)Collaborative decision making: an implementation of the Delphi approach in a social platform., , , , , , and . CASCON, page 57-71. IBM / ACM, (2012)An architecture in support of universal access to electronic commerce., , , and . Information & Software Technology, 44 (5): 279-289 (2002)Public Trust and Electronic Health Records., , and . PST, (2005)Optimal Algorithms to Embed Trees in a Point Set., , and . J. Graph Algorithms Appl., 1 (2): 1-15 (1997)Requirements gathering with Alzheimer's patients and caregivers., , , , and . ASSETS, page 142-149. ACM, (2005)Detecting Privacy Infractions in Applications: A Framework and Methodology., , , and . MASS, page 694-701. IEEE Computer Society, (2009)