Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved whale optimisation algorithm for distributed assembly flow shop with crane transportation., , , , and . Int. J. Autom. Control., 15 (6): 710-743 (2021)Enquête sur les pratiques de tests d'utilisabilité., , , and . IHM, volume 264 of ACM International Conference Proceeding Series, page 115-122. ACM, (2005)Robust Lane-Mark Extraction for Autonomous Driving Under Complex Real Conditions., , , and . IEEE Access, (2018)Detecting Mobile Malware with TMSVM., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 507-516. Springer, (2014)A Hybrid Data Cleaning Framework using Markov Logic Networks., , , , , and . CoRR, (2019)Computation of all generalized inverses of an intuitionistic fuzzy matrix., and . J. Intell. Fuzzy Syst., 30 (2): 783-789 (2016)Coding for Secure Write-Efficient Memories., and . IEEE Trans. Inf. Theory, 63 (2): 1130-1145 (2017)Emergent Decision-Making Practices in Free/Libre Open Source Software (Floss) Development Teams., , , , , and . OSS, volume 234 of IFIP, page 71-84. Springer, (2007)Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags., , , and . IEEE Access, (2020)Constructing User Profiles for Collaborative Recommender System., and . APWeb, volume 3007 of Lecture Notes in Computer Science, page 100-110. Springer, (2004)