Author of the publication

Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery.

, , , , and . CISIS-ICEUTE, volume 532 of Lecture Notes in Networks and Systems, page 171-180. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Engineers Deal with Mathematics Solving Differential Equation., , , , , and . ICCS, volume 51 of Procedia Computer Science, page 1977-1985. Elsevier, (2015)Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata., , , , and . KES, volume 2773 of Lecture Notes in Computer Science, page 1207-1214. Springer, (2003)A Protocol to Cipher Digital Images Based on Cat Maps and Cellular Automata., , and . IbPRIA (1), volume 4477 of Lecture Notes in Computer Science, page 571-578. Springer, (2007)A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata., , and . IbPRIA (1), volume 3522 of Lecture Notes in Computer Science, page 411-418. Springer, (2005)A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.. ACRI, volume 4173 of Lecture Notes in Computer Science, page 627-635. Springer, (2006)3D medical data security protection., , and . Expert Syst. Appl., (2016)Security Countermeasures of a SCIRAS Model for Advanced Malware Propagation., , and . IEEE Access, (2019)A Graph Cellular Automata Model to Study the Spreading of an Infectious Disease., , , , , and . MICAI (1), volume 7629 of Lecture Notes in Computer Science, page 458-468. Springer, (2012)About the Reversibility of Elementary Cellular Automata with Rule Number 180., and . DCAI (2), volume 332 of Lecture Notes in Networks and Systems, page 131-140. Springer, (2021)On the Statistical Analysis of an Individual-Based SI Model for Malware Propagation on WSNs., , and . CISIS-ICEUTE, volume 748 of Lecture Notes in Networks and Systems, page 187-196. Springer, (2023)