Author of the publication

Performance analysis of mobile agents for filtering data streams on wireless networks.

, , , , and . MSWiM, page 85-94. ACM, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation by superpositions of a sigmoidal function.. Math. Control. Signals Syst., 2 (4): 303-314 (1989)Overview of Control and Game Theory in Adaptive Cyber Defenses., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)A fuzzy MHT algorithm applied to text-based information tracking., , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)Network awareness and mobile agent systems., , , and . IEEE Commun. Mag., 36 (7): 44-49 (1998)Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.. ICASSP, page 498-501. IEEE, (1979)Semantic depth and markup complexity., , and . SMC, page 2138-2143. IEEE, (2003)Fixed Hypercube Embedding., , and . Inf. Process. Lett., 25 (1): 35-39 (1987)A Language of Life: Characterizing People Using Cell Phone Tracks., and . CSE (4), page 495-501. IEEE Computer Society, (2009)