Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Evaluation of Human-Reliability Based on Fuzzy-Clonal Selection., , , and . IEEE Trans. Reliability, 60 (3): 517-527 (2011)PS-InSAR time series analysis for measuring surface deformation before the L'Aquila earthquake., , , , , and . IGARSS, page 4604-4607. IEEE, (2010)Degrees-of-Freedom Regions for $K$-User MISO Time-Correlated Broadcast Channel., , and . CoRR, (2014)Children in the forest: towards a canonical problem of spatio-temporal collaboration., and . AAMAS, page 238. IFAAMAS, (2007)Game Theory Based Network Security., , , and . J. Information Security, 1 (1): 41-44 (2010)HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems., and . Future Gener. Comput. Syst., 28 (8): 1217-1235 (2012)Initial estimates for robotic hand-eye calibration., , , and . ROSE, page 20-23. IEEE, (2004)Performance analysis of ad hoc networks with interference alignment., , , and . ACSCC, page 1412-1416. IEEE, (2012)A New Integration Method of Web-Based Video Monitoring System., , and . IIH-MSP, page 623-626. IEEE, (2013)FINE: A Fully Informed aNd Efficient communication-induced checkpointing protocol for distributed systems., and . J. Parallel Distributed Comput., 69 (2): 153-167 (2009)