Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing some models for city e-government implementation: a case study., , and . Electron. Gov. an Int. J., 12 (1): 86-105 (2016)Integrated system architecture for decision-making and urban planning in smart cities., , and . IJDSN, (2019)Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment., , and . LANOMS, page 53-64. UFRGS, (2005)Evaluation of quality in encrypted VoIP calls., , , , and . CASoN, page 175-180. IEEE, (2012)Implementation of a System for Collecting and Analyzing Public and Open Access Information from Brazilian Federal Legislative Houses., and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2020)On the Determination of Epsilon during Discriminative GMM Training., , , , , , , , , and . ISM, page 362-364. IEEE Computer Society, (2010)Failures Detection in Voice Communication Systems., and . GLOBECOM, IEEE, (2006)Self-organizing Maps - An Approach Applied to the Electronic Government., , , and . WEBIST, page 461-470. SciTePress, (2012)New Approaches for XML Data Compression., , , , and . WEBIST, page 233-237. SciTePress, (2012)Metrics Application in Metropolitan Broadband Access Network Security Analysis., , , and . SECRYPT, page 473-476. INSTICC Press, (2008)