default search action
Stefan Wallin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j8]Arnab Bhattacherjee, Stefan Wallin:
Exploring Protein-Peptide Binding Specificity through Computational Peptide Screening. PLoS Comput. Biol. 9(10) (2013) - 2012
- [b1]Stefan Wallin:
Rethinking network management solutions: models, data-mining and self-learning. Luleå University of Technology, Sweden, 2012 - [j7]Stefan Wallin, Viktor Leijon, Johan Nordlander, Nicklas Bystedt:
The semantics of alarm definitions: enabling systematic reasoning about alarms. Int. J. Netw. Manag. 22(3): 181-198 (2012) - [j6]Iskra Staneva, Yongqi Huang, Zhirong Liu, Stefan Wallin:
Binding of Two Intrinsically Disordered Peptides to a Multi-Specific Protein: A Combined Monte Carlo and Molecular Dynamics Study. PLoS Comput. Biol. 8(9) (2012) - [c11]Stefan Wallin, Christer Åhlund, Johan Nordlander:
Rethinking network management: Models, data-mining and self-learning. NOMS 2012: 880-886 - 2011
- [j5]Iskra Staneva, Stefan Wallin:
Binding Free Energy Landscape of Domain-Peptide Interactions. PLoS Comput. Biol. 7(8) (2011) - [c10]Sidath Handurukande, Szymon Fedor, Stefan Wallin, Martin Zach:
Magneto approach to QoS monitoring. Integrated Network Management 2011: 209-216 - [c9]Stefan Wallin:
UML visualization of YANG models. Integrated Network Management 2011: 1129-1134 - [c8]Stefan Wallin, Claes Wikström:
Automating Network and Service Configuration Using NETCONF and YANG. LISA 2011
2000 – 2009
- 2009
- [j4]Stefan Wallin, Viktor Leijon, Leif Landen:
Statistical analysis and prioritisation of alarms in mobile networks. Int. J. Bus. Intell. Data Min. 4(1): 4-21 (2009) - [j3]Stefan Wallin:
Chasing a Definition of "Alarm". J. Netw. Syst. Manag. 17(4): 457-481 (2009) - [c7]Stefan Wallin, Viktor Leijon:
Telecom Network and Service Management: An Operator Survey. MMNS 2009: 15-26 - 2008
- [j2]Christer Åhlund, Stefan Wallin, Karl Andersson, Robert Brännström:
A service level model and Internet mobility monitor. Telecommun. Syst. 37(1-3): 49-70 (2008) - [c6]Stefan Wallin, Leif Landen:
Telecom Alarm Prioritization Using Neural Networks. AINA Workshops 2008: 1468-1473 - [c5]Viktor Leijon, Stefan Wallin, Johan Ehnmark:
SALmon A Service Modeling Language and Monitoring Engine. SOSE 2008: 202-207 - 2007
- [c4]Stefan Wallin, Viktor Leijon:
Multi-Purpose Models for QoS Monitoring. AINA Workshops (1) 2007: 900-905 - 2006
- [j1]Stefan Wallin, Viktor Leijon:
Rethinking Network Management Solutions. IT Prof. 8(6): 19-23 (2006)
1990 – 1999
- 1996
- [c3]Stefan Wallin:
Measuring the properties of an information model: the IM meter. NOMS 1996: 262-265 - 1994
- [c2]Ola Ödling, Stefan Wallin:
Building MIB Applications. NOMS 1994: 565-575
1980 – 1989
- 1989
- [c1]Toomas Timpka, Lin Padgham, Per Hedblom, Stefan Wallin, Gösta Tibblin:
A Hypertext Knowledge Base for Primary Care - LIMEDS in LINCKS. SIGIR 1989: 221-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint