Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Output analysis research: why bother? (panel discussion)., , , , , and . WSC, page 399-405. ACM, (1994)Reducing inventory cost for a medical device manufacturer using simulation., , , and . WSC, page 2109-2115. IEEE, (2013)Combined correlation induction strategies for designed simulation experiments., and . WSC, page 455-465. ACM Press, (1993)An enhanced RSM algorithm using gradient-deflection and second-order search strategies., , and . WSC, page 297-304. ACM, (1994)The applicability of blockchain in the Internet of Things., , , and . COMSNETS, page 561-564. IEEE, (2018)Validation of correlation-induction strategies for simulation experiments., and . WSC, page 190-195. ACM, (1985)An Improved Response Surface Methodology Algorithm with an Application to Traffic Signal Optimization for Urban Networks., , and . WSC, page 1104-1109. IEEE Computer Society, (1995)Clinic: correlated inputs in an automotive paint shop fire risk simulation., , , , , and . WSC, page 250-259. WSC, (2007)D-PUF: An Intrinsically Reconfigurable DRAM PUF for Device Authentication and Random Number Generation., , , , , and . ACM Trans. Embed. Comput. Syst., 17 (1): 17:1-17:31 (2018)PlumeWalk: Towards Threat Provenance Localization for IoT Networks., , , , and . COMSNETS, page 383-390. IEEE, (2019)