Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handwriting recognition for a digital whiteboard collaboration platform., , , , and . CTS, page 226-233. IEEE, (2012)Parallel network data processing in client side JavaScript applications., and . CTS, page 140-147. IEEE, (2015)Scissors Mode of Dipolar Quantum Droplets of Dysprosium Atoms, , , , , , and . Phys. Rev. Lett., (Apr 19, 2018)Liquid quantum droplets of ultracold magnetic atoms, , , , and . Journal of physics. B, Atomic, molecular and optical physics, 49 (21): 214004 (2016)The low-energy Goldstone mode in a trapped dipolar supersolid, , , , , , , and . Nature, 574 (7778): 386-389 (2019)Towards cross-platform collaboration - Transferring real-time groupware to the browser., , , and . CSCWD, page 49-54. IEEE, (2013)Tight-loose Coupling of Bundled Capabilities: The Imbalanced Utilization of Emerging Digital Technologies in Newspaper Businesses., , and . ICIS, Association for Information Systems, (2014)The Digital Disruption of Strategic Paths: An Experimental Study., , and . ICIS, Association for Information Systems, (2016)Supporting creative collaboration in globally distributed companies., , , and . CSCW, page 995-1007. ACM, (2013)Attacks on the DECT Authentication Mechanisms., , , , and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 48-65. Springer, (2009)