Author of the publication

Performance analysis of mobile agents for filtering data streams on wireless networks.

, , , , and . MSWiM, page 85-94. ACM, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Hidden Markov Models using Non-Negative Matrix Factorization, and . CoRR, (2008)Asymptotic Behavior of Attack Graph Games., and . From Database to Cyber Security, volume 11170 of Lecture Notes in Computer Science, page 104-112. Springer, (2018)Approximation by superpositions of a sigmoidal function.. Math. Control. Signals Syst., 2 (4): 303-314 (1989)Overview of Control and Game Theory in Adaptive Cyber Defenses., , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)Network awareness and mobile agent systems., , , and . IEEE Commun. Mag., 36 (7): 44-49 (1998)Semantic depth and markup complexity., , and . SMC, page 2138-2143. IEEE, (2003)Round-off error propagation in Durbin's, Levinson's, and Trench's algorithms.. ICASSP, page 498-501. IEEE, (1979)Fixed Hypercube Embedding., , and . Inf. Process. Lett., 25 (1): 35-39 (1987)A fuzzy MHT algorithm applied to text-based information tracking., , and . IEEE Trans. Fuzzy Syst., 10 (3): 360-374 (2002)A Language of Life: Characterizing People Using Cell Phone Tracks., and . CSE (4), page 495-501. IEEE Computer Society, (2009)