Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When traceroute Met BGP... How to reveal hidden internet as-level connectivity with Portolan and Isolario., , , , , , , , and . INFOCOM Workshops, page 147-148. IEEE, (2014)Inferring geography from BGP raw data., , , , and . INFOCOM Workshops, page 208-213. IEEE, (2012)UAV-Derived Multispectral Bathymetry., , and . Remote. Sens., 12 (23): 3897 (2020)Principles for Object-Linguistic Consequence: from Logical to Irreflexive., and . J. Philos. Log., 47 (3): 549-577 (2018)A Unified Theory of Truth and Paradox.. Rev. Symb. Log., 12 (2): 209-254 (2019)WebDHT: browser-compatible distributed hash table for decentralized Web applications., and . NCA, page 277-284. IEEE, (2022)Evaluation of the Laser Response of Leica Nova MultiStation MS60 for 3D Modelling and Structural Monitoring., , , , , , , , and . ICCSA (4), volume 10407 of Lecture Notes in Computer Science, page 93-104. Springer, (2017)Animating Multiple Instances in BPMN Collaborations: From Formal Semantics to Tool Support., , , , and . BPM, volume 11080 of Lecture Notes in Computer Science, page 83-101. Springer, (2018)Peak-Shaped-Based Steganographic Technique for JPEG Images., , and . EURASIP J. Information Security, (2009)Grounding, Quantifiers, and Paradoxes., , and . J. Philos. Log., 50 (6): 1417-1448 (2021)