Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A YANG Network Data Model for Layer 3 VPNs., , , , and . RFC, (February 2022)A YANG Network Data Model for Layer 2 VPNs., , , and . RFC, (September 2022)Predictive Models for the Characterization of Internal Defects in Additive Materials from Active Thermography Sequences Supported by Machine Learning Methods., , , , , , and . Sensors, 20 (14): 3982 (2020)Linear representations of convolutional codes over rings., , and . CoRR, (2016)Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol., , , , , and . CoRR, (2024)Operations Model Based on Lean Manufacturing to Increase the Perfect Order Rate in SMEs in the Consolidated Freight Distribution Sector., , , and . ICIBE, page 115-122. ACM, (2022)Every Convolutional Code is a Goppa Code., , , and . IEEE Trans. Inf. Theory, 59 (10): 6628-6641 (2013)RADSSo: An Automated Tool for the multi-CASH Machine Learning Problem., , and . HAIS, volume 12344 of Lecture Notes in Computer Science, page 183-194. Springer, (2020)On the existence and construction of maximum distance profile convolutional codes., and . Finite Fields Their Appl., (2021)On Aggregation and Prediction of Cybersecurity Incident Reports., , , and . IEEE Access, (2021)