Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of the "Nogood Processor" Technique in Scale-Free Networks., , and . IDC, volume 511 of Studies in Computational Intelligence, page 163-173. Springer, (2013)Considerations towards security and privacy in Internet of Things based eHealth applications., , and . SISY, page 275-280. IEEE, (2016)A methodology for improving complex sales success in CRM Systems., and . INISTA, page 322-327. IEEE, (2017)A taxonomic view of cloud computing services., , and . Int. J. Comput. Sci. Eng., 11 (1): 17-28 (2015)Applying ontologies for workflow modelling and execution for a virtual ISP., , and . Int. J. Web Grid Serv., 4 (3): 330-341 (2008)Stock Market Multi-Agent Recommendation System Based on the Elliott Wave Principle., , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 332-346. Springer, (2012)Real-Time Polymorphic Aho-Corasick Automata for Heterogeneous Malicious Code Detection., and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 439-448. Springer, (2013)Evolutionary Approach to Negotiation in Game AI., , and . SYNASC, page 296-302. IEEE Computer Society, (2013)Managing Risk Behavior on an Evolutionary Market - A Risk Limits and Value-at-Risk Measures Approach., and . SYNASC, page 543-550. IEEE Computer Society, (2013)An Event Driven Multi-agent Architecture for Enabling Cloud Governance., , and . UCC, page 309-314. IEEE Computer Society, (2012)