Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of quality in encrypted VoIP calls., , , , and . CASoN, page 175-180. IEEE, (2012)Integrated system architecture for decision-making and urban planning in smart cities., , and . IJDSN, (2019)Assessing some models for city e-government implementation: a case study., , and . Electron. Gov. an Int. J., 12 (1): 86-105 (2016)Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment., , and . LANOMS, page 53-64. UFRGS, (2005)Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment., , and . J. Netw. Syst. Manag., 15 (2): 267-283 (2007)Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative Houses., and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2020)Thermal modeling of power transformers using evolving fuzzy systems., , , and . Eng. Appl. Artif. Intell., 25 (5): 980-988 (2012)On the Determination of Epsilon during Discriminative GMM Training., , , , , , , , , and . ISM, page 362-364. IEEE Computer Society, (2010)Unsupervised learning clustering and self-organized agents applied to help network management., , , and . Expert Syst. Appl., (2016)Baseline to help with network management., , , and . e-Business and Telecommunication Networks, Springer, (2006)