Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service token for identity access management., , and . APSCC, page 34-39. IEEE, (2009)Numerical Analysis of Cyberattacks on Unmanned Aerial Systems., , , , , and . Infotech@Aerospace, (2012)Markov-network based latent link analysis for community detection in social behavioral interactions., , , , , and . Appl. Intell., 48 (8): 2081-2096 (2018)Deduction from Conditional Knowledge on Bayesian Networks with Interval Probability Parameters., and . CSSE (1), page 594-597. IEEE Computer Society, (2008)Quantifying influences in the qualitative probabilistic network with interval probability parameters., , and . Appl. Soft Comput., 11 (1): 1135-1143 (2011)Multi-agent Oriented Stable Payoff with Cooperative Game., , and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 74-81. Springer, (2013)Cleaning Missing Data Based on the Bayesian Network., , , and . WAIM Workshops, volume 7901 of Lecture Notes in Computer Science, page 348-359. Springer, (2013)A Game-Theoretic Approach for Balancing the Tradeoffs between Data Availability and Query Delay in Multi-hop Cellular Networks., , and . TAMC, volume 7287 of Lecture Notes in Computer Science, page 487-497. Springer, (2012)Maximizing the Cooperative Influence Spread in a Social Network Oriented to Viral Marketing., , , , and . APWeb Workshops, volume 9865 of Lecture Notes in Computer Science, page 3-15. (2016)Event-based state estimation algorithm using Markov chain approximation., , and . CDC, page 6998-7003. IEEE, (2013)