Author of the publication

Policy Engineering for Security Management of Organization Information Systems.

, , and . LANOMS, page 289-294. UFRGS, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Resource Allocation and Task Offloading for Hybrid NOMA-assisted MEC Network with Network Slicing., , , , and . ICACT, page 164-170. IEEE, (2023)Optimal reservoir operation using a hybrid Simulated Annealing Algorithm-Genetic Algorithm., , , and . BIC-TA, page 454-458. IEEE, (2010)Improved error estimates for splitting methods applied to highly-oscillatory nonlinear Schrödinger equations., , , and . Math. Comput., (2016)Text string detection for loosely constructed characters with arbitrary orientations., , and . Neurocomputing, (2015)QoS Based Proportional Fair Scheduling Algorithm for CDMA Forward Link., and . VTC Spring, page 1031-1035. IEEE, (2007)Towards A Virtual Machine Migration Algorithm Based On Multi-Objective Optimization., , and . IJMCMC, 8 (3): 79-89 (2017)Yang Hui type magic squares with t-powered sum., , and . Ars Comb., (2017)T-S Fuzzy-Based Optimal Control for Minimally Invasive Robotic Surgery with Input Saturation., , , and . J. Sensors, (2018)The semantic architecture of the World-Wide Molecular Matrix (WWMM), , , , and . J. Cheminf., 3 (1): 42 (2011)JUMBO - An XML infrastructure for eScience, , , , , , , , and . Proceedings of the 2004 e-Science All Hands Meeting, 31st August - 3rd September, Nottingham UK, (2004)