Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information capacity of bosonic channels., , , , , , and . ISIT, page 324. IEEE, (2004)Profiles and protocols for the Internet Public-Key Infrastructure., and . FTDCS, page 220-224. IEEE Computer Society, (1997)Integrating Petri Nets and hybrid heuristic search for the scheduling of FMS., , , and . Computers in Industry, 47 (1): 123-138 (2002)The Ranks of m * n * (mn-2) Tensors., and . SIAM J. Comput., 12 (4): 611-615 (1983)Counting Binary Functions with Certain Cryptographic Properties.. J. Cryptology, 5 (2): 107-131 (1992)DUCHESS: a high level information system., and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 35-40. AFIPS Press, (1974)Predicting Patterns in Spatial Ecology Using Neural Networks: Modelling Colonisation of New Zealand Fur Seals., , , , and . ISESS, volume 167 of IFIP Conference Proceedings, page 57-65. Kluwer, (1999)Values of Large Games, I: A Limit Theorem., and . Math. Oper. Res., 3 (1): 1-9 (1978)Identification of metallic mine-like objects using low frequency magnetic fields., , and . IEEE Trans. Geoscience and Remote Sensing, 39 (1): 56-66 (2001)Further Remark on Stably Updating Mean and Standard Deviation Estimates.. Commun. ACM, 22 (8): 483 (1979)