Author of the publication

Array Design and Expression Evaluation in POOMA II.

, , , , , , , and . ISCOPE, volume 1505 of Lecture Notes in Computer Science, page 231-238. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CT Reconstruction Using FBP with Sinusoidal Amendment for Metal Artefact Reduction., , and . DICTA, page 439-448. CSIRO Publishing, (2003)Applying Evolution Program Techniques to Constrained Continuous Optimal Control Problems., and . International Conference on Evolutionary Computation, page 285-290. (1996)Automated Assignment of Backbone Resonances Using Residual Dipolar Couplings Acquired from a Protein with Known Structure., , , and . BIOCOMP, page 646-652. CSREA Press, (2008)Array Design and Expression Evaluation in POOMA II., , , , , , , and . ISCOPE, volume 1505 of Lecture Notes in Computer Science, page 231-238. Springer, (1998)An iteratively tuned fuzzy logic movement model in WSN using particle swarm optimization., , , , and . ICSPCS, page 1-7. IEEE, (2013)Building a Taxonomy for Cybercrimes., , and . PACIS, page 109. (2013)The Development of Theoretical Framework for In-App Purchasing for the Gaming Industry., , , and . PACIS, page 30. (2015)Moving Towards Information System Security Accreditation within Australian State Government Agencies., , , and . AMCIS, page 46. Association for Information Systems, (2008)Key Factors in E-Government Information System Security., and . Bled eConference, page 32. (2005)A mathematical model for spatial orientation from pictorial perspective displays., , and . IEEE Trans. Systems, Man, and Cybernetics, 18 (3): 425-437 (1988)