Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating high-throughput reliable multicast for grid applications in production networks., , , , and . CCGRID, page 442-449. IEEE Computer Society, (2005)Performance of the CMS Level-1 Trigger, and . (2013)arxiv:1302.2469.Search for a light pseudoscalar Higgs boson in the dimuon decay channel in pp collisions at √s = 7 TeV, , , , , , , , , and 2183 other author(s). Phys Rev Lett, 109 (12): 121801-121801 (September 2012)The Design of a Tool-Supported Graphical Notation for Timed CSP., and . IFM, volume 2335 of Lecture Notes in Computer Science, page 299-318. Springer, (2002)Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation., , , and . ADHOC-NOW, volume 4686 of Lecture Notes in Computer Science, page 129-141. Springer, (2007)Game Development Using Design-by-Contract., , and . J. Object Technol., 5 (7): 57-73 (2006)Towards an insider threat prediction specification language., , and . Inf. Manag. Comput. Secur., 14 (4): 361-381 (2006)A Study on Classification in Imbalanced and Partially-Labelled Data Streams., , , and . SMC, page 1506-1511. IEEE, (2013)Utilizing statistical significance in fuzzy interval-valued evidence sets for assessing artificial reef structure impact., , and . JORS, 69 (6): 905-918 (2018)A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks., , and . ECIW, page 271-280. Academic Conferences Limited, Reading, UK, (2005)