Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reinforcement Learning-Based Algorithm to Predict Vulnerability Occurrence in a Wireless Networking Environment., and . MLMTA, page 237-241. CSREA Press, (2003)Comparative Evaluation of Genetic Algorithms for Force-Based Self-Deployment of Mobile Agents in Manets., , , , , , and . GEM, page 90-85. CSREA Press, (2008)Identifying Security Threats in Ad Hoc Wireless Network., and . Security and Management, page 34-40. CSREA Press, (2003)Special Purpose Hardware for Discrete Fourier Transform Implementation., and . Parallel Comput., 20 (2): 215-232 (1994)Markov Chain Models for Genetic Algorithm Based Topology Control in MANETs., , , , , , and . EvoApplications (2), volume 6025 of Lecture Notes in Computer Science, page 41-50. Springer, (2010)Music Generation Using an LSTM., , , , , and . CoRR, (2022)Sequential Machines Realized by Group Representations. Inf. Comput., 85 (2): 183-201 (April 1990)Genetic algorithms for self-spreading nodes in MANETs., , , , , , and . GECCO, page 1141-1142. ACM, (2008)Uniform Manet Node Distribution for Mobile Agents Using Genetic Algorithms., , , , , , , and . GEM, page 24-30. CSREA Press, (2007)Bio-inspired topology control for knowledge sharing mobile agents., , , , , , and . Ad Hoc Networks, 7 (4): 677-689 (2009)