Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experienced-based Evaluation of Economic Benefits of On-line Monitoring Systems for Power Transformers, , , , , , , and . (2002)On the calibration of local jump-diffusion asset price models., and . Finance and Stochastics, 15 (4): 685-724 (2011)The Ariba Framework for Application Development using Service Overlays., , and . Praxis der Informationsverarbeitung und Kommunikation, 33 (1): 7-11 (2010)Deuteration distribution estimation with improved sequence coverage for HX/MS experiments., , , , , , , , , and 1 other author(s). Bioinformatics, 26 (12): 1535-1541 (2010)An Approach for Urban Sensing with Quality-Aware Situation Detection and Efficient Communication., , and . ECEASST, (2011)Crucial HSP70 co-chaperone complex unlocks metazoan protein disaggregation., , , , , , , , , and 5 other author(s). Nature, 524 (7564): 247-251 (2015)Man-machine communication via simplified English., , and . Commun. ACM, 4 (5): 235-236 (1961)Spontaneous Virtual Networks: On the Road Towards the Internet's Next Generation., , , , , , , , and . it - Information Technology, 50 (6): 367-375 (2008)Hybrid routing in delay tolerant networks.. Karlsruhe Institute of Technology, (2012)Distack -- A Framework for Anomaly-Based Large-Scale Attack Detection., , and . SECURWARE, page 34-40. IEEE Computer Society, (2008)