Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Children in the forest: towards a canonical problem of spatio-temporal collaboration., and . AAMAS, page 238. IFAAMAS, (2007)Robot control with a fully tuned Growing Radial Basis Function neural network., , and . IJCNN, page 342-348. IEEE, (2011)Novel Reconciliation Protocol Based on Spinal Code for Continuous-variable Quantum Key Distribution., , , , and . CoRR, (2019)Game Theory Based Network Security., , , and . J. Information Security, 1 (1): 41-44 (2010)Performance analysis of ad hoc networks with interference alignment., , , and . ACSCC, page 1412-1416. IEEE, (2012)Augmented Time-frequency Mask Estimation in Cluster-based Source Separation Algorithms., and . ICASSP, page 710-714. IEEE, (2019)Initial estimates for robotic hand-eye calibration., , , and . ROSE, page 20-23. IEEE, (2004)HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems., and . Future Gener. Comput. Syst., 28 (8): 1217-1235 (2012)FINE: A Fully Informed aNd Efficient communication-induced checkpointing protocol for distributed systems., and . J. Parallel Distributed Comput., 69 (2): 153-167 (2009)A New Integration Method of Web-Based Video Monitoring System., , and . IIH-MSP, page 623-626. IEEE, (2013)