Author of the publication

Three-dimensional lattice Boltzmann simulations of high density ratio two-phase flows in porous media

, , , , and . Computers and Mathematics with Applications, 75 (7): 2445-2465 (2018)
DOI: 10.1016/j.camwa.2017.12.028

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleep quality prediction in caregivers using physiological signals., , , and . Comp. in Bio. and Med., (2019)A Broad Evaluation of the Tor English Content Ecosystem., , , and . WebSci, page 333-342. ACM, (2019)Three-dimensional lattice Boltzmann simulations of high density ratio two-phase flows in porous media, , , , and . Computers and Mathematics with Applications, 75 (7): 2445-2465 (2018)Detection of Stator Short-Circuit Faults in Induction Motors Using the Concept of Instantaneous Frequency., , and . IEEE Trans. Industrial Informatics, 15 (8): 4506-4515 (2019)Early Hospital Mortality Prediction using Vital Signals., , and . CoRR, (2018)Studieren mit Sicherheit in Bochum - Die Studiengänge zum Thema IT-Sicherheit., , , and . Datenschutz und Datensicherheit, 31 (5): 338-342 (2007)Guest Editorial Special Section on Hardware Security and Trust., , , , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (6): 873-874 (2015)Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions., , , , and . Towards Hardware-Intrinsic Security, Springer, (2010)Mobile Platform Security, , , , , , and . Synthesis Lectures on Information Security, Privacy, and Trust Morgan & Claypool Publishers, (2013)Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization., , , , , and . IEEE Symposium on Security and Privacy, page 574-588. IEEE Computer Society, (2013)