Author of the publication

Synthesis, characterization and structure of tribromo(2-phenyl-1,8-naphthyridine)gold(III)

, , , , , , , and . Zeitschrift fuer Naturforschung, B: A Journal of Chemical Sciences, 66 (7): 677--680 (2011)
DOI: 10.1515/znb-2011-0704

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Synthesis, characterization and structure of tribromo(2-phenyl-1,8-naphthyridine)gold(III), , , , , , , and . Zeitschrift fuer Naturforschung, B: A Journal of Chemical Sciences, 66 (7): 677--680 (2011)MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises., , , and . MATA, volume 3284 of Lecture Notes in Computer Science, page 234-243. Springer, (2004)An Evaluation of Brazilian Ports for Corn Export Using Multicriteria Analysis., , , , , , , and . APMS (1), volume 566 of IFIP Advances in Information and Communication Technology, page 129-134. Springer, (2019)HYDROWEB, an Online Tool for the Calculation of Hydrodynamic Properties of Macromolecules., , , , , , , , and . IWBBIO, volume 9656 of Lecture Notes in Computer Science, page 82-90. Springer, (2016)Technology Companies in Judicial Reorganization., and . APMS (2), volume 567 of IFIP Advances in Information and Communication Technology, page 611-616. Springer, (2019)Maximum number of r-edge-colorings such that all copies of Kk are rainbow., , , , and . LAGOS, volume 195 of Procedia Computer Science, page 419-426. Elsevier, (2021)Towards Bandwidth Estimation Using Flow-Level Measurements., , , and . AIMS, volume 7279 of Lecture Notes in Computer Science, page 127-138. Springer, (2012)Broad and load-aware anycast mapping with verfploeter., , , , , and . IMC, page 477-488. ACM, (2017)Booter blacklist: Unveiling DDoS-for-hire websites., , , , , and . CNSM, page 144-152. IEEE, (2016)Exploring security vulnerabilities of unmanned aerial vehicles., , and . NOMS, page 993-994. IEEE, (2016)