Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pricing model for 3G/4G networks., and . PIMRC, page 187-191. IEEE, (2002)ARQ Aware Scheduling for the IEEE 802.16 Base Station., , and . ICC, page 2667-2673. IEEE, (2008)Packet Scheduling Algorithm with Weight Optimization., , , and . ICETE (2), page 127-133. INSTICC Press, (2004)Efficient Mode Decision Schemes for HEVC Inter Prediction., , and . IEEE Trans. Circuits Syst. Video Techn., 24 (9): 1579-1593 (2014)GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices-A Cybersecurity Pentesting Perspective., , , and . IEEE Access, (2022)Towards large-scale, automated, accurate detection of CCTV camera objects using computer vision. Applications and implications for privacy, safety, and cybersecurity. (Preprint)., , , and . CoRR, (2020)Defensive Machine Learning Methods and the Cyber Defence Chain., , and . Artificial Intelligence and Cybersecurity, Springer International Publishing, (2023)Accelerating genetic algorithm computation in tree shaped parallel computer., , , , and . J. Syst. Archit., 42 (1): 19-36 (1996)Recommendations for using Simulated Annealing in task mapping., , and . Des. Autom. Embed. Syst., 17 (1): 53-85 (2013)Simulation Study on 3G and WLAN Inter-Working., , , , and . IEICE Trans. Commun., 89-B (2): 446-459 (2006)