Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Principles of Pervasive Cloud Monitoring., , and . ISCIS, page 117-124. Springer, (2014)Social resilience in online communities: the autopsy of friendster., , and . COSN, page 39-50. ACM, (2013)Design and Development of a Wireless Emergency Start and Stop System for Robots., , and . ICINCO (2), page 223-230. SciTePress, (2014)Towards a Data Driven Storage Infrastructure for Grids., , , , , and . PDPTA, page 179-184. CSREA Press, (2003)Recognition of 3D Object from One Image Based on Projective and Permutative Invariants., , , , and . ICIAR (1), volume 3212 of Lecture Notes in Computer Science, page 705-712. Springer, (2004)Admission Control Policies in Multiservice Cellular Networks: Optimum Configuration and Sensitivity., , and . EuroNGI Workshop, volume 3427 of Lecture Notes in Computer Science, page 121-135. Springer, (2004)Musimage: A System for Automatically Presenting Pictures Depending on the Music Being Played., , and . VISUAL, volume 5188 of Lecture Notes in Computer Science, page 319-322. Springer, (2008)Mixed Precision Training., , , , , , , , , and 1 other author(s). ICLR (Poster), OpenReview.net, (2018)Online privacy as a collective phenomenon., , and . COSN, page 95-106. ACM, (2014)Remote-access education based on image acquisition and processing through the Internet., , and . IEEE Trans. Educ., 46 (1): 142-148 (2003)