Author of the publication

Interference Free Integration of Pervasive Applications.

, , , , and . TrustCom, page 1499-1506. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Procesamiento de imágenes infrarrojas para detectar deficiencias de nitrógeno de cultivos en ambientes controlados usando dispositivos móviles., , , , and . Res. Comput. Sci., 150 (4): 27-40 (2021)A greedy algorithm to construct covering arrays using a graph representation., and . Inf. Sci., (2019)A graph-based postoptimization approach for covering arrays., and . Qual. Reliab. Eng. Int., 33 (8): 2171-2180 (2017)hClique: An exact algorithm for maximum clique problem in uniform hypergraphs., , and . Discret. Math. Algorithms Appl., 9 (6): 1750078:1-1750078:14 (2017)Dynamic adaptation of personal ubicomp environments., , , , , and . Pers. Ubiquitous Comput., 20 (2): 165-166 (2016)Fast inexact mapping using advanced tree exploration on backward search methods., , , , , and . BMC Bioinform., (2015)Relevance Feedback in Conceptual Image Retrieval: A User Evaluation, and . CoRR, (2008)Interference Free Integration of Pervasive Applications., , , , and . TrustCom, page 1499-1506. IEEE Computer Society, (2012)Macro Malware Detection using Machine Learning Techniques - A New Approach., and . ICISSP, page 295-302. SciTePress, (2017)Behavioral Biometric Authentication in Android Unlock Patterns through Machine Learning., , , and . ICISSP, page 146-154. SciTePress, (2019)