Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unscented Bayesian optimization for safe robot grasping., , , and . IROS, page 1967-1972. IEEE, (2016)Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System., , , , , and . SAISMC, page 223-234. University of Plymouth, (2010)Image Segmentation Using Morphological Watershed Applied to Cartography., , , and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 156-162. Springer, (2004)Caracterização de Interrupções na Internet usando RIPE Atlas., , , , , , and . SBRC, page 113-126. (2018)Governo Eletrônico em Ambientes Colaborativos Virtuais., , , and . SBSI, page 121-132. (2009)A-CitizenMobile: A case study for blind users., , , and . ICITST, page 713-717. IEEE, (2011)Surface Albedo and Temperature Models for Surface Energy Balance Fluxes and Evapotranspiration Using SEBAL and Landsat 8 over Cerrado-Pantanal, Brazil., , , , , , and . Sensors, 21 (21): 7196 (2021)Fault tolerance in spatial query processing for Wireless Sensor Networks., , and . NOMS, page 97-104. IEEE, (2012)NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks., , and . ICCCN, page 803-808. IEEE, (2007)Self-configuration of wireless multi-hop networks., , and . Integrated Network Management, page 940-945. IEEE, (2011)