Author of the publication

Application of SOA in Safety-Critical Embedded Systems.

, , , , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 345-354. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of security techniques in web services., , , and . iiWAS, page 270-277. ACM, (2011)Meta-heuristic multi- and many-objective optimization techniques for solution of machine learning problems., , and . Expert Syst. J. Knowl. Eng., (2017)On the Assessment of Nature-Inspired Meta-Heuristic Optimization Techniques to Fine-Tune Deep Belief Networks., , , , and . Deep Neural Evolution, Springer, (2020)Optimizing Feature Selection through Binary Charged System Search., , , , , and . CAIP (1), volume 8047 of Lecture Notes in Computer Science, page 377-384. Springer, (2013)Using SOA in Critical-Embedded Systems., , , , , and . iThings/CPSCom, page 733-738. IEEE Computer Society, (2011)Strategies for Classifier Selection Based on Genetic Programming for Multimedia Data Recognition., , , , and . VISIGRAPP (2): VISAPP, page 788-795. SCITEPRESS, (2024)Service-Oriented Architectures for a Flexible and Safe Use of Unmanned Aerial Vehicles., , , , , , and . IEEE Intell. Transport. Syst. Mag., 9 (1): 97-109 (2017)Quaternion-Based Backtracking Search Optimization Algorithm., , and . CEC, page 3014-3021. IEEE, (2019)A wrapper approach for feature selection based on Bat Algorithm and Optimum-Path Forest., , , , , , and . Expert Syst. Appl., 41 (5): 2250-2258 (2014)Social-Spider Optimization-based Support Vector Machines applied for energy theft detection., , , , , , and . Comput. Electr. Eng., (2016)