Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Assembly Plans.. ICRA (2), page 515-520. IEEE Computer Society Press, (1993)A Graph-Based Formalism for Modelling Assembly Tasks., and . ICRA, page 1296-1301. IEEE Computer Society, (1995)Multimedia, network protocols and users - bridging the gap., , and . ACM Multimedia (1), page 473-476. ACM, (1999)Boundary models for assembly knowledge representation., , and . IEEE Trans. Robotics Autom., 12 (2): 302-312 (1996)Content sensitivity based access control framework for Hadoop., , , and . Digit. Commun. Networks, 3 (4): 213-225 (2017)Deception framework for sensor networks., , and . SecureComm, page 361-369. IEEE, (2007)Pseudo-Tree Data Structure for Content-Based Composition and Synchronization of Multimedia Presentations.. MMM, page 253-268. World Scientific Press, (1996)Developing an empirical study of how qualified subjects might be selected for IT system security penetration testing., , , and . Ann. UMCS Informatica, 2 (1): 414-424 (2004)Improving Perceptual Multimedia Quality with an Adaptable Communication Protocol., and . J. Comput. Inf. Technol., 13 (2): 149-161 (2005)A Self-learning Personal Privacy Assistant., and . AINA, volume 1151 of Advances in Intelligent Systems and Computing, page 276-287. Springer, (2020)