Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving threat detection in networks using deep learning., , and . Ann. des Télécommunications, 75 (3-4): 133-142 (2020)The Impact of Propagation Models in the Performance of Ad Hoc Routing Protocols for Urban VANET., , , and . VTC Fall, page 1-5. IEEE, (2016)Using MIMO adaptive transmission for increasing the throughput of a multihop wireless network., , , and . Wireless Days, page 1-5. IEEE, (2008)Oportunidades de Transmissão: Nova Métrica para Otimização de Recursos em Redes Veiculares., , , and . SBRC, page 252-265. (2019)On strategies to help reduce contamination on public transit: a multilayer network approach., , , , and . Appl. Netw. Sci., 8 (1): 37 (December 2023)Find a Meeting., , , , , , , and . EUSAI, volume 2875 of Lecture Notes in Computer Science, page 3-14. Springer, (2003)Towards spatiotemporal integration of bus transit with data-driven approaches., , , , and . J. Internet Serv. Appl., 15 (1): 59-71 (2024)A Greedy Ant Colony Optimization for routing in delay tolerant networks., , , and . GLOBECOM Workshops, page 1127-1132. IEEE, (2011)An Agent Approach to IP Inter Domains SLA Management using Policies., , and . IMSA, page 264-269. IASTED/ACTA Press, (2002)A strategy for opportunistic cognitive channel allocation in wireless Internet of Things., , , , and . Wireless Days, page 1-3. IEEE, (2014)