Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reinforcement Learning-Based Algorithm to Predict Vulnerability Occurrence in a Wireless Networking Environment., and . MLMTA, page 237-241. CSREA Press, (2003)Comparative Evaluation of Genetic Algorithms for Force-Based Self-Deployment of Mobile Agents in Manets., , , , , , and . GEM, page 90-85. CSREA Press, (2008)Uniform Manet Node Distribution for Mobile Agents Using Genetic Algorithms., , , , , , , and . GEM, page 24-30. CSREA Press, (2007)Genetic algorithms for self-spreading nodes in MANETs., , , , , , and . GECCO, page 1141-1142. ACM, (2008)Markov Chain Models for Genetic Algorithm Based Topology Control in MANETs., , , , , , and . EvoApplications (2), volume 6025 of Lecture Notes in Computer Science, page 41-50. Springer, (2010)Identifying Security Threats in Ad Hoc Wireless Network., and . Security and Management, page 34-40. CSREA Press, (2003)Discrete Sequence Prediction Using Machine Learning Methods., and . IC-AI, page 1097-1101. CSREA Press, (2004)Simulation Experiments for Knowledge Sharing Agents Using Genetic Algorithms in MANETs., , , , , , and . Artificial Intelligence and Pattern Recognition, page 369-376. ISRST, (2007)Release-to-Release Binary Compatibility in SOM., , , and . OOPSLA, page 426-438. ACM, (1995)OOPSLA'95, Addendum to the Proceedings: OOPS Messenger 6(4) October 1995.