Author of the publication

Benchmarking of Localization Solutions: Guidelines for the Selection of Evaluation Points.

, , , and . Ad Hoc Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A phishing Mitigation Solution using Human Behaviour and Emotions that Influence the Success of Phishing Attacks., , , and . UMAP (Adjunct Publication), page 345-350. ACM, (2021)Efficient space-filling and non-collapsing sequential design strategies for simulation-based modeling., , and . Eur. J. Oper. Res., 214 (3): 683-696 (2011)Phishing Attacks Root Causes., , , and . CRiSIS, volume 10694 of Lecture Notes in Computer Science, page 187-202. Springer, (2017)Pareto-Based Multi-output Metamodeling with Active Learning., , , and . EANN, volume 43 of Communications in Computer and Information Science, page 389-400. (2009)Performance study of gradient-enhanced Kriging., , , , and . Eng. Comput., 32 (1): 15-34 (2016)A hybrid sequential sampling based metamodelling approach for high dimensional problems., , , , and . CEC, page 1917-1923. IEEE, (2016)Evolutionary Regression Modeling with Active Learning: An Application to Rainfall Runoff Modeling., , , , and . ICANNGA, volume 5495 of Lecture Notes in Computer Science, page 548-558. Springer, (2009)Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process., , , and . IEEE Access, (2021)Cooperation Techniques between LTE in Unlicensed Spectrum and Wi-Fi towards Fair Spectral Efficiency., , , , , and . Sensors, 17 (9): 1994 (2017)On the use of gradients in kriging surrogate models., , , , and . WSC, page 2692-2701. IEEE/ACM, (2014)