Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounds on hop distance in greedy routing approach in wireless ad hoc networks., , , and . Int. J. Wirel. Mob. Comput., 1 (2): 131-140 (2006)Evaluation of a Diagnosis Algorithm for Regular Structures., , , and . IEEE Trans. Computers, 51 (7): 850-865 (2002)TEBAKA: Territorial Basic Knowledge Acquisition. An Agritech Project for Italy: Results on Self-Supervised Semantic Segmentation., , and . ISCC, page 1116-1121. IEEE, (2023)Experimenting Forecasting Models for Solar Energy Harvesting Devices for Large Smart Cities Deployments., , , , , and . ISCC, page 1177-1182. IEEE, (2019)Why it does not work? Metaheuristic task allocation approaches in Fog-enabled Internet of Drones., , , and . Simul. Model. Pract. Theory, (2024)Fault-diagnosis of grid structures., , , and . Theor. Comput. Sci., 290 (2): 1149-1174 (2003)A Dynamic Programming Algorithm for High-Level Task Scheduling in Energy Harvesting IoT., , , , and . IEEE Internet of Things Journal, 5 (3): 2234-2248 (2018)Reliable Routing in Wireless Ad Hoc Networks: The Virtual Routing Protocol., , , and . J. Netw. Syst. Manag., 14 (3): 335-358 (2006)Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform., , , , , and . PASM, volume 310 of Electronic Notes in Theoretical Computer Science, page 113-133. Elsevier, (2014)Signals from the depths: Properties of percolation strategies with the Argo dataset., , , , and . ISCC, page 372-378. IEEE Computer Society, (2016)