Author of the publication

Using Failure Information Analysis to Detect Enterprise Zombies.

, , and . SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 185-206. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Late Breaking Results: Analytical Placement for 3D ICs with Multiple Manufacturing Technologies., , , , , and . DAC, page 1-2. IEEE, (2023)Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search., , and . ACIS-ICIS, page 1135-1140. IEEE Computer Society, (2007)Estimating Bus Cross-Sectional Flow Based on Machine Learning Algorithm Combined with Wi-Fi Probe Technology., , and . Sensors, 21 (3): 844 (2021)Heegard-Berger Video Coding Using LMMSE Estimator., , , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 122-130. Springer, (2006)Analysis for gene networks based on logic relationships., , , , , and . J. Systems Science & Complexity, 23 (5): 999-1011 (2010)Design Elements that Promote the use of Fake Website Detection Tools., , and . CoRR, (2013)Constructing Linear Codes with Good Joint Spectra, , , , and . CoRR, (2008)Grant-free Rateless Multiple Access: A Novel Massive Access Scheme for Internet of Things., , , and . CoRR, (2016)Data-Driven Stochastic Models and Policies for Energy Harvesting Sensor Communications., , and . CoRR, (2014)Lyapunov Optimization for Energy Harvesting Wireless Sensor Communications., , , and . IEEE Internet of Things Journal, 5 (3): 1947-1956 (2018)