Author of the publication

An Application of the Cahn-Hilliard Approach to Smoothed Particle Hydrodynamics

, , , , and . Mathematical Problems in Engineering, (2014)
DOI: 10.1155/2014/694894

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying Real-Time Programming to Legacy Embedded Control Software., , , , and . ISORC, page 1-8. IEEE Computer Society, (2015)Predicting patient-reported outcomes following hip and knee replacement surgery using supervised machine learning., , and . BMC Med. Inf. & Decision Making, 19 (1): 3:1-3:13 (2019)Cryptographically Enforced Four-Eyes Principle., , , and . ARES, page 760-767. IEEE Computer Society, (2016)On the physically based modeling of surface tension and moving contact lines with dynamic contact angles on the continuum scale, , , , , , and . Journal of computational physics, (2016)An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space., , , , , and . CPSS@AsiaCCS, page 39-50. ACM, (2018)A Secure Architecture for Operating System-Level Virtualization on Mobile Devices., , , , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 430-450. Springer, (2015)Droplet dynamics: Comparison of Smoothed Particle Hydrodynamics and experimental results, , , , and . 7th International Berlin Workshop - IBW7 on Transport Phenomena with Moving Boundaries and More, 947, Düsseldorf, VDI-Verl., (2015)A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices., , , , , and . ARES, page 120-128. IEEE Computer Society, (2015)Improving mobile device security with operating system-level virtualization., , , and . Computers & Security, (2015)A flexible framework for mobile device forensics based on cold boot attacks., , , , and . EURASIP J. Information Security, (2016)