Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning-based Cooperative Trail Following for Multi-Robot System., , , and . IJCNN, page 1-8. IEEE, (2018)Hiding "real" machine from attackers and malware with a minimal virtual machine monitor., , and . SecureComm, page 21. ACM, (2008)A Trustworthy Resource Selection Approach in Grid with Fuzzy Reputation Aggregation., , and . AWIC, volume 43 of Advances in Soft Computing, page 142-147. Springer, (2007)Running stability of hydraulic confined piston engine based on virtual prototype., , , and . RAM, page 291-294. IEEE, (2011)AT-RBAC: An Authentication Trustworthiness-Based RBAC Model., , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 343-350. Springer, (2004)An Adaptive Algorithm for Failure Recovery During Dynamic Service Composition., , , and . PReMI, volume 4815 of Lecture Notes in Computer Science, page 41-48. Springer, (2007)Exploring the patterns of social behavior in GitHub., , , and . CrowdSoft@SIGSOFT FSE, page 31-36. ACM, (2014)Parallelized Synchronous Multi-agent Deep Reinforcement Learning with Experience Replay Memory., , , , , and . SOSE, IEEE, (2019)A Secure Virtual Execution Environment for Untrusted Code., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 156-167. Springer, (2007)Together: A Hybrid Overlay for Application-Layer Multicast in Heterogeneous Environment., , , and . GPC, volume 5036 of Lecture Notes in Computer Science, page 364-372. Springer, (2008)