Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving security in WMNs with reputation systems and self-organizing maps., , , , , , , , , and 1 other author(s). J. Netw. Comput. Appl., 34 (2): 455-463 (2011)Architectural Synthesis of Fixed-Point DSP Datapaths Using FPGAs., , , , and . Int. J. Reconfigurable Comput., (2009)Forecasting Based on Short Time Series Using ANNs and Grey Theory - Some Basic Comparisons., , , and . IWANN (1), volume 6691 of Lecture Notes in Computer Science, page 183-190. Springer, (2011)Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection., , and . CISIS, volume 53 of Advances in Soft Computing, page 147-154. Springer, (2008)Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security., , , and . IJDSN, (2013)Utilization factor of a distributed system based on an Ethernet network., , and . PDP, page 273-277. IEEE, (1993)SORU: A Reconfigurable Vector Unit for Adaptable Embedded Systems., , , , , , , , , and 2 other author(s). ARC, volume 5453 of Lecture Notes in Computer Science, page 255-260. Springer, (2009)A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors., , , , , and . WWIC, volume 5546 of Lecture Notes in Computer Science, page 73-84. Springer, (2009)Modular Framework for Smart Home Applications., , , , , , , , and . IWANN (2), volume 5518 of Lecture Notes in Computer Science, page 695-701. Springer, (2009)Optimal combined word-length allocation and architectural synthesis of digital signal processing circuits., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 53-II (5): 339-343 (2006)