Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Service-Based Computing on Manets: Enabling Dynamic Interoperability of First Responders., , , , , , , and . IEEE Intelligent Systems, 20 (5): 17-25 (2005)ForumDash: analyzing online discussion forums., , , , , , and . L@S, page 139-140. ACM, (2014)Service-based computing for agents on disruption and delay prone networks., , , , , and . AAMAS, page 1341-1342. ACM, (2005)Implementation Experience with OMG's SCIOP Mapping., , , , , , and . OTM, volume 2888 of Lecture Notes in Computer Science, page 1081-1091. Springer, (2003)Behavioral anomaly detection of malware on home routers., , , , , and . MALWARE, page 47-54. IEEE Computer Society, (2017)Demonstration: disaster evacuation support., , , , , , , , and . AAMAS, page 263. IFAAMAS, (2007)The AI Technologies of the Philadelphia Area Urban Wireless Network Testbed., , , , , , , , , and 10 other author(s). AAAI, page 1674-1675. AAAI Press / The MIT Press, (2005)Torrent-Based Dissemination in Infrastructure-Less Wireless Networks., , , , , , and . J. Cyber Secur. Mobil., 4 (1): 1-22 (2015)Designing Dependable Agent Systems for Mobile Wireless Networks., , , , , , and . IEEE Intelligent Systems, 19 (5): 39-45 (2004)Network Awareness and the Philadelphia Area Urban Wireless Network Testbed., , , , , , , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 70-75. AAAI, (2005)