Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Least-squares based feature extraction and sensor fusion for explosive detection., , , , , , , , , and 2 other author(s). ICASSP, page 2918-2921. IEEE, (2010)Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations., , , , , , , and . FOCI, USENIX Association, (2012)Scalable Electronic Health Record Management System Using a Dual-Channel Blockchain Hyperledger Fabric., and . Syst., 11 (7): 346 (July 2023)Implementing a multiagent negotiation protocol in Erlang., , and . Erlang Workshop, page 69-74. ACM, (2010)Simulation of Attacks for Security in Wireless Sensor Network., and . Sensors, 16 (11): 1932 (2016)Security Estimation in Wireless Sensor Network Simulator., , and . J. Circuits Syst. Comput., 25 (7): 1650067:1-1650067:18 (2016)A formal semantics for agent distribution and fault tolerance in Jason., , , and . J. Log. Algebraic Methods Program., (June 2023)eJason: a Framework for Distributed and Fault-Tolerant Multi-Agent Systems.. Technical University of Madrid, Spain, (2018)Quality labels for e-health., , and . IET Commun., 2 (2): 202-207 (2008)Modeling and simulation of secure wireless sensor network., , , , and . FDL, page 185-192. IEEE, (2012)