Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fuzzy set approach to Retinex spray sampling., and . Multimedia Tools Appl., 76 (23): 24723-24748 (2017)Managing a pool of rules for credit card fraud detection by a Game Theory based approach., , , , , and . Future Gener. Comput. Syst., (2020)An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events., and . KES, volume 3215 of Lecture Notes in Computer Science, page 321-327. Springer, (2004)A Distributed and Privacy-Preserving Method for Network Intrusion Detection., , , and . OTM Conferences (2), volume 6427 of Lecture Notes in Computer Science, page 861-875. Springer, (2010)Selection of Information Streams in Social Sensing: an Interdependence- and Cost-aware Ranking Method., , , , and . MEDES, page 157-161. ACM, (2020)Smart connected parking lots based on secured multimedia IoT devices., , , and . Computing, 103 (6): 1143-1164 (2021)Tag relatedness in image folksonomies., , , , , and . Document Numérique, 17 (2): 33-54 (2014)Hybrid Inspector-Inspectee-Agent Games in Mobile Cloud Computing., , , and . Q2SWinet, page 95-100. ACM, (2020)What can Machine Learning do for Radio Spectrum Management?, , , and . Q2SWinet, page 15-21. ACM, (2020)Supply Chain Risk Analysis: Open Source Simulator., , , , , , and . SITIS, page 443-450. IEEE Computer Society, (2009)