Author of the publication

Acellular Dermal Matrix Seeded with Autologous Fibroblasts Improves Wound Breaking Strength in a Rodent Soft Tissue Damage Model in Neoadjuvant Settings

, , , , , , and . Journal of Biomaterials Applications, 25 (5): 413-427 (2011)PMID: 20042428.
DOI: 10.1177/0885328209347961

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for solving a spatial optimisation problem on a parallel computer., , , , and . Concurrency - Practice and Experience, 9 (8): 753-780 (1997)Maritime abnormality detection using Gaussian processes., , , , and . Knowl. Inf. Syst., 38 (3): 717-741 (2014)Beyond Multiprocessing: Multithreading the SunOS Kernel., , , , , , , , and . USENIX Summer, USENIX Association, (1992)The DJammer: äir-scratching" and freeing the DJ to join the party., , , and . CHI Extended Abstracts, page 1789-1792. ACM, (2005)The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System.. NSPW, page 109-117. ACM, (1993)XML Representation of Digital Videos for Visual Data Mining Applications., and . ITCC (1), page 179-183. IEEE Computer Society, (2005)On Pricing Complex IT Service Solutions., , , , , , and . SRII Global Conference, page 55-64. IEEE Computer Society, (2014)Smartphone habit and behavior in Brunei: Personalization, gender, and generation gap., , , , , and . Computers in Human Behavior, (2016)Web Mining Applications for Mobile Devices.. IKE, page 404-408. CSREA Press, (2010)Lightweight Directory Access Protocol (LDAP) Authorization Identity Request and Response Controls., , and . RFC, (July 2004)