Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Third-Party Call Control in H.323 Networks - A Case Study., , , , , , and . ICN (2), volume 2094 of Lecture Notes in Computer Science, page 559-569. Springer, (2001)A visual environment for the manipulation and integration of JAVA beans.. Bioinformatics, 14 (8): 739-748 (1998)Visualising Large Data Sets in Molecular Biology., , and . IDS, page 8. Springer, (1996)SnapShot: Visualization to Propel Ice Hockey Analytics., , , and . IEEE Trans. Vis. Comput. Graph., 18 (12): 2819-2828 (2012)Electroencephalogram Based Detection of Deep Sedation in ICU Patients Using Atomic Decomposition., , , , , , , , and . IEEE Trans. Biomed. Engineering, 65 (12): 2684-2691 (2018)When Deceitful Chats Look Truthful., , and . J. Comput. Inf. Syst., 56 (4): 331-340 (2016)The Impact of Media Richness, Suspicion, and Perceived Truth Bias on Deception Detection., and . HICSS, IEEE Computer Society, (2005)One Technique for the Discrete Analysis of Continuous Data.. ACM Pacific, page 156-162. (1975)Measurements and models for 38-GHz point-to-multipoint radiowave propagation., , , and . IEEE Journal on Selected Areas in Communications, 18 (3): 310-321 (2000)Overloaded array processing with spatially reduced search joint detection., , , , and . IEEE Journal on Selected Areas in Communications, 19 (8): 1584-1593 (2001)