Author of the publication

From Measures to Conclusions Using Analytic Hierarchy Process in Dependability Benchmarking.

, , , and . IEEE Trans. Instrum. Meas., 63 (11): 2548-2556 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Measures to Conclusions Using Analytic Hierarchy Process in Dependability Benchmarking., , , and . IEEE Trans. Instrum. Meas., 63 (11): 2548-2556 (2014)Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper)., and . EDCC, page 222-225. IEEE Computer Society, (2014)Attack Injection to Support the Evaluation of Ad Hoc Networks., , , and . SRDS, page 21-29. IEEE Computer Society, (2010)Resilience-Driven Parameterisation of Ad Hoc Routing Protocols: olsrd as a Case Study., , , and . SRDS, page 85-90. IEEE Computer Society, (2011)Multi-criteria analysis of measures in benchmarking: Dependability benchmarking as a case study., , , and . J. Syst. Softw., (2016)Coarse-grained resilience benchmarking using logic score of preferences: ad hoc networks as a case study., , , and . EWDC, page 23-28. ACM, (2011)Open Challenges in the Resilience Evaluation of Ad Hoc Networks., , , and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 194-197. Springer, (2013)Emerging Trends in adaptive Computation for MobiQuitous Systems.. J. Comput. Sci., 10 (11): 2164 (2014)An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks., , , and . PRDC, page 228-233. IEEE Computer Society, (2009)Ambient noise in wireless mesh networks: Evaluation and proposal of an adaptive algorithm to mitigate link removal., , , and . J. Netw. Comput. Appl., (2014)