Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Industrial Non-intrusive Coded-Target Identification and Decoding Application., , , and . IbPRIA, volume 7887 of Lecture Notes in Computer Science, page 790-797. Springer, (2013)Hierarchical Taxonomy Extraction by Mining Topical Query Sessions., and . KDIR, page 229-235. INSTICC Press, (2009)The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market., , , and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 191-199. Springer, (2010)Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks., , , , , , and . ARES, page 520-525. IEEE Computer Society, (2008)Priority list of biodiversity metrics to observe from space, , , , , , , , , and 21 other author(s). Nature Ecology and Evolution, (2021)Identifying potential landslide location using Unmanned Aerial Vehicles (UAVs)., , , , , , , , and . ISCRAM, ISCRAM Association, (2019)Com@Rehab: An Interactive and Personalised Rehabilitation Activity Based on Virtual Reality., , , , , , , , , and . BIOSTEC (2), page 776-788. SCITEPRESS, (2024)Framing the concept of satellite remote sensing essential biodiversity variables: challenges and future directions, , , , , , , , , and 33 other author(s). Remote Sensing in Ecology and Conservation, (2016)The Distributed Generation as an Important Contribution to Energy Development in Angola and Other Developing African Countries., , , and . DoCEIS, volume 423 of IFIP Advances in Information and Communication Technology, page 269-276. Springer, (2014)Combined Data Mining Approach for Intrusion Detection., , , , , and . SECRYPT, page 67-73. INSTICC Press, (2007)