Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Agent Security Through Multi-Agent Cryptographic Protocols., and . International Conference on Internet Computing, page 462-470. CSREA Press, (2003)Random constraint satisfaction: Easy generation of hard (satisfiable) instances., , , and . Artif. Intell., 171 (8-9): 514-534 (2007)A general model and thresholds for random constraint satisfaction problems., , and . Artif. Intell., (2012)On the correspondence between creeping flows of viscous and viscoelastic fluids, and . Journal of Non-Newtonian Fluid Mechanics, (2007)Unsupervised Feature Selection by Heuristic Search with Provable Bounds on Suboptimality., , , and . AAAI, page 666-672. AAAI Press, (2016)Generation of the HY-2 satellite altimeter Look-Up Table to account for the PTR and LPF features., , , and . IGARSS, page 4217-4220. IEEE, (2013)Special issue on big data inspired data sensing, processing and networking technologies., , , and . Ad Hoc Networks, (2015)Torrents on Twitter: Explore Long-Term Social Relationships in Peer-to-Peer Systems., , , , and . IEEE Trans. Network and Service Management, 10 (1): 95-104 (2013)GENI Cinema: An SDN-Assisted Scalable Live Video Streaming Service., , , , , , , and . ICNP, page 529-532. IEEE Computer Society, (2014)A Domain-Independent System for Case-Based Task Decomposition without Domain Theories., and . AAAI, page 234-240. AAAI Press / The MIT Press, (2005)