Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements for Trustworthy Artificial Intelligence - A Review., , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 105-115. Springer, (2020)Trustworthy Artificial Intelligence: A Review., , , and . ACM Comput. Surv., 55 (2): 39:1-39:38 (2023)A Trustworthy Human-Machine framework for collective decision making in Food-Energy-Water management: The role of trust sensitivity., , , , , and . Knowl. Based Syst., (2021)Broadcast Protocol for Energy-Constrained Networks., and . TBC, 53 (1): 112-119 (2007)Cloud computing: networking and communication challenges., , and . IEEE Communications Magazine, 50 (9): 24-25 (2012)Adaptive Coordination Protocol for Heterogeneous Wireless Networks., and . ICC, page 4805-4810. IEEE, (2007)A Search Space Reduction Algorithm for Improving the Performance of a GA-based QoS Routing Method in Ad-Hoc Networks., , , , , and . IJDSN, 3 (1): 41-57 (2007)M3PS: A JXTA-based Multi-platform P2P System and its Web Application Tools., , , and . IJWIS, 2 (3/4): 187-196 (2006)Implementation of a JXTA-based P2P e-learning system and its performance evaluation., , , , and . IJWIS, 4 (3): 352-371 (2008)Advances in modelling and evaluation of communication systems., , and . Telecommun. Syst., 38 (3-4): 69-70 (2008)