Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A YANG Network Data Model for Layer 3 VPNs., , , , and . RFC, (February 2022)A YANG Network Data Model for Layer 2 VPNs., , , and . RFC, (September 2022)Predictive Models for the Characterization of Internal Defects in Additive Materials from Active Thermography Sequences Supported by Machine Learning Methods., , , , , , and . Sensors, 20 (14): 3982 (2020)Every Convolutional Code is a Goppa Code., , , and . IEEE Trans. Inf. Theory, 59 (10): 6628-6641 (2013)Operations Model Based on Lean Manufacturing to Increase the Perfect Order Rate in SMEs in the Consolidated Freight Distribution Sector., , , and . ICIBE, page 115-122. ACM, (2022)Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol., , , , , and . CoRR, (2024)Linear representations of convolutional codes over rings., , and . CoRR, (2016)Rosenthal's Decoding Algorithm for Certain 1-Dimensional Convolutional Codes., , and . IEEE Trans. Inf. Theory, 65 (12): 7736-7741 (2019)Machine learning for automatic assignment of the severity of cybersecurity events., , and . Comput. Math. Methods, (2020)3D Digital Surveying and Modelling of Cave Geometry: Application to Paleolithic Rock Art., , , , and . Sensors, 9 (2): 1108-1127 (2009)