Author of the publication

Un repertorio legislativo hipertextual mediante marcado de texto: las Disposiciones Generales del Boletín Oficial de la Comunidad de Madrid.

, , , , and . JBIDI, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Molecular Docking Screening Using Agonist-Bound GPCR Structures: Probing the A2A Adenosine Receptor., , , , and . J. Chem. Inf. Model., 55 (3): 550-563 (2015)Data hiding algorithm for HEVC using intra-coded frames., , , and . SummerSim, page 2:1-2:12. ACM, (2018)End-to-End ARAIM demonstrator: magicARAIM suite., , , , , , , , and . ENC, page 1-10. IEEE, (2020)Intra-Steganography: Hiding Data in High-Resolution Videos., , , and . DS-RT, page 190-197. IEEE Computer Society, (2018)Mobile Fingerprint Identification Using a Hardware Accelerated Biometric Service Provider., , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 383-388. Springer, (2006)Un repertorio legislativo hipertextual mediante marcado de texto: las Disposiciones Generales del Boletín Oficial de la Comunidad de Madrid., , , , and . JBIDI, (2000)Directional People Counter Based on Head Tracking., , , , , and . IEEE Trans. Ind. Electron., 60 (9): 3991-4000 (2013)What Can Smart Mobility Offer to Tourism Economy?, , , and . EUROCAST (2), volume 12014 of Lecture Notes in Computer Science, page 182-189. Springer, (2019)Automated GDPR compliance assessment for cross-border personal data transfers in android applications., , , and . Comput. Secur., (2023)Network Coding for Security in Wireless Reconfigurable Networks., , , and . Wireless Networks and Security, Springer, (2013)