Author of the publication

Ökonomische und ökologische Bewertung der getrennten Sammlung von verwertbaren Abfällen aus privaten Haushalten: 8. Würzburger Verpackungsforum \dq5. Novelle der Verpackungsverordnung\dq, Würzburg 06.10.2009

, , , , , , , and . Verpackungsverwertung zwischen Anspruch und Wirklichkeit, page 67--94. Witzenhausen, Verlag Witzenhausen, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enrichment of the visual experience by a wider choice of projections., , and . CSCWD, page 355-360. IEEE, (2007)A general rule for disk and hemisphere partition into equal-area cells., and . Comput. Geom., 45 (7): 275-283 (2012)A 66 line heat transfer finite element code to highlight the dual approach., and . Computers & Mathematics with Applications, 70 (10): 2401-2413 (2015)The universal projection for computing data carried on the hemisphere., , and . Computer-Aided Design, 43 (2): 219-226 (2011)Ökonomische und ökologische Bewertung der getrennten Sammlung von verwertbaren Abfällen aus privaten Haushalten: 8. Würzburger Verpackungsforum \dq5. Novelle der Verpackungsverordnung\dq, Würzburg 06.10.2009, , , , , , , and . Verpackungsverwertung zwischen Anspruch und Wirklichkeit, page 67--94. Witzenhausen, Verlag Witzenhausen, (2009)On the multi-component layout design with inertial force., , and . J. Computational Applied Mathematics, 234 (7): 2222-2230 (2010)A structured and model-based hazard analysis and risk assessment method for automotive systems., , , and . ISSRE, page 238-247. IEEE Computer Society, (2013)An Integrated Approach for Device Independent Publication of Complex Multimedia Documents., , , and . IMSA, page 347-352. IASTED/ACTA Press, (2005)Structured Pattern-Based Security Requirements Elicitation for Clouds., , , , and . ARES, page 465-474. IEEE Computer Society, (2013)A Problem-Based Threat Analysis in Compliance with Common Criteria., , and . ARES, page 111-120. IEEE Computer Society, (2013)