Author of the publication

Modeling real networks with deterministic preferential attachment

, and . Control & Automation (MED), 2011 19th Mediterranean Conference on, page 13--18. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Point to Point Learning Control of a Two-Link Flexible Arm., , and . ISER, volume 200 of Lecture Notes in Control and Information Sciences, page 545-560. Springer, (1993)Influence of Topological Features on Spatially-Structured Evolutionary Algorithms Dynamics, , and . CoRR, (2012)Improving resilience of interdependent critical infrastructures via an on-line alerting system, , , , , , , , , and 1 other author(s). Complexity in Engineering, 2010. COMPENG'10., page 88--90. IEEE, (2010)Vulnerabilità indotte dal Cyberspace sui Sistemi di Monitoraggio e Controllo, and . Atti del Convegno Nazionale ANIPLA--ENERSIS, (2004)A Game of Age of Incorrect Information Against an Adversary Injecting False Data., , , and . CSR, page 347-352. IEEE, (2023)Design and Implementation of a State Observer for a Flexible Robot., and . ICRA (3), page 204-209. IEEE Computer Society Press, (1993)Online Distributed Interdependency Estimation for critical infrastructures., , and . CDC/ECC, page 7224-7229. IEEE, (2011)A networked transferable belief model approach for distributed data aggregation - Dynamic version., , , and . CDC, page 1237-1242. IEEE, (2010)Discrete-time LTI fuzzy systems: Stability and representation., , and . CDC, page 6181-6186. IEEE, (2012)INFUSION: A system for situation and threat assessment in current and foreseen scenarios., and . CogSIMA, page 316-323. IEEE, (2012)