Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Resource Management for Mobile Services., , and . MATA, volume 2881 of Lecture Notes in Computer Science, page 156-169. Springer, (2003)JavaSpace: When Agents Meet Peers., , and . MATA, volume 3284 of Lecture Notes in Computer Science, page 349-358. Springer, (2004)On-Line Building Energy Optimization Using Deep Reinforcement Learning., , , , , , and . IEEE Trans. Smart Grid, 10 (4): 3698-3708 (2019)Relevance as a Metric for Evaluating Machine Learning Algorithms., , , and . MLDM, volume 7988 of Lecture Notes in Computer Science, page 195-208. Springer, (2013)Embedded self-healing layer for detecting and recovering sensor faults in body sensor networks., , and . SMC, page 2377-2382. IEEE, (2012)Anomaly Detection in Sensor Systems Using Lightweight Machine Learning., , , and . SMC, page 7-13. IEEE, (2013)An Experimental-Based Review of Image Enhancement and Image Restoration Methods for Underwater Imaging., , , , , and . IEEE Access, (2019)Cloud based scalable object recognition from video streams using orientation fusion and convolutional neural networks., , , , and . Pattern Recognit., (2022)Multivariate Time Series Characterization and Forecasting of VoIP Traffic in Real Mobile Networks., , , , and . IEEE Trans. Netw. Serv. Manag., 21 (1): 851-865 (February 2024)Disrupting Resilient Criminal Networks through Data Analysis: The case of Sicilian Mafia., , , , , , and . CoRR, (2020)