Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Children in the forest: towards a canonical problem of spatio-temporal collaboration., and . AAMAS, page 238. IFAAMAS, (2007)Performance analysis of ad hoc networks with interference alignment., , , and . ACSCC, page 1412-1416. IEEE, (2012)Initial estimates for robotic hand-eye calibration., , , and . ROSE, page 20-23. IEEE, (2004)HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems., and . Future Gener. Comput. Syst., 28 (8): 1217-1235 (2012)FINE: A Fully Informed aNd Efficient communication-induced checkpointing protocol for distributed systems., and . J. Parallel Distributed Comput., 69 (2): 153-167 (2009)PS-InSAR time series analysis for measuring surface deformation before the L'Aquila earthquake., , , , , and . IGARSS, page 4604-4607. IEEE, (2010)Quantitative Evaluation of Human-Reliability Based on Fuzzy-Clonal Selection., , , and . IEEE Trans. Reliability, 60 (3): 517-527 (2011)Degrees-of-Freedom Regions for $K$-User MISO Time-Correlated Broadcast Channel., , and . CoRR, (2014)Game Theory Based Network Security., , , and . J. Information Security, 1 (1): 41-44 (2010)Linear Decision Fusion under the Control of Constrained PSO for WSNs., , , , and . IJDSN, (2012)