Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling and analysing ubiquitous systems., , , and . ETFA, page 1-4. IEEE, (2010)Vulnerability Analysis of Software Defined Networking., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 97-116. Springer, (2016)Proving sequential function chart programs using timed automata., , and . Theor. Comput. Sci., 267 (1-2): 141-155 (2001)Virtual reality to improve remote control in presence of delays., , , and . VECIMS, page 42-46. IEEE, (2010)Defining a communication service management function for 5G network slices., , , and . EuCNC, page 144-148. IEEE, (2019)Toward a Generic Framework for Ubiquitous System., , , and . GPC Workshops, page 165-172. IEEE Computer Society, (2009)Méthodes et outils informatiques pour la commande locale ou distante de systèmes réactifs.. (2004)Special Issue on Ambient Assisted Living.. J. Intell. Syst., 24 (3): 299-300 (2015)Software Defined Networking Reactive Stateful Firewall., , , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 119-132. Springer, (2016)New Method for Localization and Human Being Detection using UWB Technology: Helpful Solution for Rescue Robots., , , , , and . CoRR, (2013)