Author of the publication

Bioinformatics applied to public safety: Improving fingerprint revelation left in crime scenes to criminal identification in real time.

, , , and . SMC, page 2306-2311. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Network in Development of 3D Collaborative Virtual Environments: A Systematic Review., , , , , and . ICCSA (1), volume 8579 of Lecture Notes in Computer Science, page 769-785. Springer, (2014)A gateway architecture for QoS management considering time constraint application., , and . SMC, page 1300-1305. IEEE, (2010)Comparative analysis of the prototype and the simulator of a new load balancing algorithm for heterogeneous computing environments., , , and . Int. J. High Perform. Comput. Netw., 1 (1/2/3): 64-74 (2004)QoS Proxy Architecture for Real Time RPC with Traffic Prediction., , , and . DS-RT, page 261-267. IEEE Computer Society, (2007)JMonitor: A monitoring tool for distributed systems., and . SMC, page 1767-1772. IEEE, (2012)Unity Cluster Package - Dragging and Dropping Components for Multi-projection Virtual Reality Applications Based on PC Clusters., , , , and . ICCSA (5), volume 9159 of Lecture Notes in Computer Science, page 261-272. Springer, (2015)Immersive Ground Control Station for Unmanned Aerial Vehicles., , , and . ICCSA (1), volume 10404 of Lecture Notes in Computer Science, page 595-604. Springer, (2017)Analytical Performance Modelling of the CPER Multiprocessor., and . PDPTA, page 1409-1420. CSREA Press, (1996)Distributed Component-Based Software Development Strategy Integrated By MVCase Tool., , , and . JIISIC, page 97-106. (2002)A Mobile Active Environment for Distance Education., , and . IMSA, page 13-16. IASTED/ACTA Press, (2001)