Author of the publication

From Specification to Hardware Device: A Synthesis Algorithm.

, , and . ICFEM, volume 2885 of Lecture Notes in Computer Science, page 665-681. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emerging structures of P2P networks induced by social relationships., , , and . Comput. Commun., 31 (3): 620-628 (2008)An adaptive overlay network inspired by social behaviour., , , and . J. Parallel Distributed Comput., 70 (3): 282-295 (2010)Terrorism and War: Twitter Cascade Analysis., , , , and . IDC, volume 798 of Studies in Computational Intelligence, page 309-318. Springer, (2018)Cloud in Mobile Platforms: Managing Authentication/Authorization., , , , , and . WorldCIST (2), volume 931 of Advances in Intelligent Systems and Computing, page 361-372. Springer, (2019)A Network-Based Analysis of a Worksite Canteen Dataset., , , , and . Big Data Cogn. Comput., 5 (1): 11 (2021)Evaluating the community partition quality of a network with a genetic programming approach., , , , and . COMPLEX NETWORKS, volume 693 of Studies in Computational Intelligence, page 299-308. Springer, (2016)From Specification to Hardware Device: A Synthesis Algorithm., , and . ICFEM, volume 2885 of Lecture Notes in Computer Science, page 665-681. Springer, (2003)Food Recommendation in a Worksite Canteen., , , , and . COMPLEXIS, page 117-124. SCITEPRESS, (2021)An Adaptive Algorithm for Geofencing., , , , and . AITM/ISM@FedCSIS, volume 346 of Lecture Notes in Business Information Processing, page 115-135. Springer, (2018)A Heuristic to Explore Trust Networks Dynamics., , , and . IDC, volume 511 of Studies in Computational Intelligence, page 67-76. Springer, (2013)