Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario., , and . IEEE Access, (2023)CyberDect. A Novel Approach for Cyberbullying Detection on Twitter., , , and . CITI, volume 1124 of Communications in Computer and Information Science, page 109-121. Springer, (2019)TomoEED: fast edge-enhancing denoising of tomographic volumes., , , , and . Bioinform., 34 (21): 3776-3778 (2018)A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare., , and . ACM Comput. Surv., 55 (12): 249:1-249:38 (December 2023)Validacion de medidas para evaluar la mantenibilidad de programas SQL., and . JISBD, page 131-140. Universidad de Valladolid, Departamento de Informática, (2000)Measuring for Database Programs Maintainability., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 65-78. Springer, (2000)Parallel algorithms for high-speed SAR processing., , , , , , and . SAR, volume 3497 of SPIE Proceedings, page 0000. SPIE, (1998)A Branch-and-Cut Algorithm for the Single Truck and Trailer Routing Problem with Satellite Depots., , , , , and . Transp. Sci., 50 (2): 735-749 (2016)A Proposal for control Database Software Application Development., and . ICEIS, page 109-116. (1999)Tracking Organs Composed of One or Multiple Regions Using Geodesic Active Region Models., and . Recent Advances in the 3D Physiological Human, Springer, (2009)