Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks., and . ADHOCNETS, volume 223 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 47-59. Springer, (2017)Designing Accessible Visual Programming Tools for Children with Autism Spectrum Condition., , , and . CoRR, (2019)HMS: Holistic MPR selection and network connectivity for tactical edge networks., , , , and . MILCOM, page 726-731. IEEE, (2015)Wages, layoffs, and privatization: Evidence from Ukraine, , and . Journal of Comparative Economics, 34 (2): 272--294 (June 2006)Segmented neural network modelling using adaboost., , and . Neural Networks and Computational Intelligence, page 13-18. IASTED/ACTA Press, (2004)Sigmoid neural network incremental construction by using a boosting method., , and . Neural Networks and Computational Intelligence, page 216-221. IASTED/ACTA Press, (2004)Assessment of spectral indices for crop residue cover estimation., , , , , and . IGARSS, page 1827-1830. IEEE, (2010)Improved Remotely-Sensed Estimates of Crop Residue Cover by Incorporating Soils Information., , , , , and . IGARSS (4), page 267-270. IEEE, (2008)An approach for constructing parsimonious generalized Gaussian kernel regression models., , and . Neurocomputing, (2004)On the robustness of the OLSR protocol under unwanted interference., , , and . MILCOM, page 563-568. IEEE, (2016)