Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A preferential attachment model for primate social networks., , , and . Comput. Networks, (2015)Redesigning Computer-based Learning Environments: Evaluation as Communication, , and . CoRR, (2007)Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective., , , and . Comput. Commun., (2014)Multi-hop localization system for environmental monitoring in wireless sensor and actor networks., , and . Concurr. Comput. Pract. Exp., 25 (5): 701-717 (2013)A vertex-similarity clustering algorithm for community detection., , , and . J. Inf. Telecommun., 4 (1): 36-50 (2020)Design Challenges of Trustworthy Artificial Intelligence Learning Systems., , , and . ACIIDS (Companion), volume 1178 of Communications in Computer and Information Science, page 574-584. Springer, (2020)Is the clustering coefficient a measure for fault tolerance in wireless sensor networks?, , , and . ICC, page 183-187. IEEE, (2012)Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection., , , and . OLA, volume 1173 of Communications in Computer and Information Science, page 37-48. Springer, (2020)Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes., , and . Comput. Networks, (2014)The Rise of Drones in Internet of Things: A Survey on the Evolution, Prospects and Challenges of Unmanned Aerial Vehicles., , , and . IEEE Access, (2021)