Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data hiding algorithm for HEVC using intra-coded frames., , , and . SummerSim, page 2:1-2:12. ACM, (2018)Molecular Docking Screening Using Agonist-Bound GPCR Structures: Probing the A2A Adenosine Receptor., , , , and . J. Chem. Inf. Model., 55 (3): 550-563 (2015)End-to-End ARAIM demonstrator: magicARAIM suite., , , , , , , , and . ENC, page 1-10. IEEE, (2020)Intra-Steganography: Hiding Data in High-Resolution Videos., , , and . DS-RT, page 190-197. IEEE Computer Society, (2018)Mobile Fingerprint Identification Using a Hardware Accelerated Biometric Service Provider., , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 383-388. Springer, (2006)Un repertorio legislativo hipertextual mediante marcado de texto: las Disposiciones Generales del Boletín Oficial de la Comunidad de Madrid., , , , and . JBIDI, (2000)Finding Balanced Incomplete Block Designs with Metaheuristics., , and . EvoCOP, volume 5482 of Lecture Notes in Computer Science, page 156-167. Springer, (2009)What Can Smart Mobility Offer to Tourism Economy?, , , and . EUROCAST (2), volume 12014 of Lecture Notes in Computer Science, page 182-189. Springer, (2019)Adaptive Control of a DC Motor for Educational Practices., , and . ACE, page 244-249. International Federation of Automatic Control, (2013)Automated GDPR compliance assessment for cross-border personal data transfers in android applications., , , and . Comput. Secur., (2023)