Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Verification of Opacity in Web Services and Their Composition., , , and . IEEE Trans. Serv. Comput., 10 (1): 66-79 (2017)A Distributed Approach for High-Dimensionality Heterogeneous Data Reduction., , , and . IEEE Access, (2019)Variable lookahead supervisory control with state information., , and . IEEE Trans. Autom. Control., 39 (12): 2398-2410 (1994)A Survey of Routing Protocols for WSNs in Smart Farming Applications., , and . DiCES-N, volume 1564 of Communications in Computer and Information Science, page 24-37. Springer, (2022)Online Games Servers Placement in Fog Computing: an Hybrid Bio-inspired Approach., , and . LCN Symposium, page 141-149. IEEE, (2020)A Behavior-Aware Systematic Approach for Merging Business Process Fragments., , and . ICECCS, page 194-197. IEEE Computer Society, (2014)The Design and Implementation of the Control and Integration Software of a Flexible Manufacturing System., , and . ICSI, page 494-502. IEEE Computer Society, (1990)Centralized and distributed algorithms for on-line synthesis of maximal control policies under partial observation., , and . Discret. Event Dyn. Syst., 6 (4): 379-427 (1996)Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments., , and . ACSC, volume 147 of CRPIT, page 89-98. Australian Computer Society, (2014)Dimensionality reduction with missing values imputation., , , and . CoRR, (2017)