Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internet of Things: Architectural Framework for eHealth Security., , , and . J. ICT Stand., 1 (3): 301-328 (2014)Emergent Behaviors in the Internet of Things: The Ultimate Ultra-Large-Scale System., , , , and . IEEE Micro, 36 (6): 36-44 (2016)Call routing to distributed queues: Is FIFO really better than MED?, , and . Telecommun. Syst., 7 (1-3): 299-312 (1997)Fog Computing: A Platform for Internet of Things and Analytics., , , and . Big Data and Internet of Things, volume 546 of Studies in Computational Intelligence, Springer, (2014)The Inside-Out Approach to Infection Control.. Information Systems Security, 14 (6): 33-37 (2006)An Abstraction Methodology for the Evaluation of Multi-core Multi-threaded Architectures., , , , , and . MASCOTS, page 478-481. IEEE Computer Society, (2011)Neural Network Implementation of Admission Control., , and . NIPS, page 493-499. Morgan Kaufmann, (1990)Radio Resource Allocation for a High Capacity Vehicular Access Network., , and . VTC Fall, page 1-5. IEEE, (2011)Advances in the Hierarchical Emergent Behaviors (HEB) Approach to Autonomous Vehicles., , , and . IEEE Intell. Transp. Syst. Mag., 12 (4): 57-65 (2020)Dynamic Network Call Distribution with Periodic Updates, , and . page 85-94. (1994)