Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Evolutionary View of Collective Intelligence., and . ICAART (2), page 571-577. SciTePress, (2013)The Rise and Fall of Napster - An Evolutionary Approach., and . Active Media Technology, volume 2252 of Lecture Notes in Computer Science, page 347-354. Springer, (2001)Modeling Strategies as Generous and Greedy in Prisoner's Dilemma like Games., , and . SEAL, volume 1585 of Lecture Notes in Computer Science, page 285-292. Springer, (1998)Privacy Invasive Software in File-Sharing Tools., , and . International Information Security Workshops, volume 148 of IFIP, page 277-292. Kluwer, (2004)Analysis and interpretation of a constrained notch filter., and . ICASSP, page 293-296. IEEE Computer Society, (1992)Identification of a discrete-time nonlinear Hammerstein-Wiener model for a selective catalytic reduction system., , , and . ACC, page 78-83. IEEE, (2011)Privacy-Invasive Software and Preventive Mechanisms., and . ICSNC, page 21. IEEE Computer Society, (2006)Input-Output Stability Design of an Ammonium Based Aeration Controller for Wastewater Treatment., , and . ACC, page 2964-2971. IEEE, (2018)Introducing a Novel Security-Enhanced Agile Software Development Process., , , and . Int. J. Secur. Softw. Eng., 8 (2): 26-52 (2017)Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions., and . SAC, page 42-48. ACM, (2002)