Author of the publication

Short-term prediction of traffic flow using a binary neural network.

, , , , and . Neural Comput. Appl., 25 (7-8): 1639-1655 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Short-term prediction of traffic flow using a binary neural network., , , , and . Neural Comput. Appl., 25 (7-8): 1639-1655 (2014)Opportunistic spectrum access: challenges, architecture, protocols., , , , , and . WICON, page 13. ACM, (2006)On Single-Server Delegation of RSA., , , , , , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 81-101. Springer, (2022)SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security., , , , , , , , and . WCNC, page 49-54. IEEE, (2022)Disconnection-resilient IP link-state routing for airborne networks., , , , , , and . MILCOM, page 1991-1996. IEEE, (2011)Scalable spectrum situational awareness using devices of opportunity., , , , , , , and . MILCOM, page 1-5. IEEE, (2012)An Overview of Opportunistic Routing in Mobile Ad Hoc Networks., and . MILCOM, page 119-124. IEEE, (2013)Smart Office Spaces., , , , , , and . USENIX Workshop on Embedded Systems, USENIX Association, (1999)Optimization Algorithms for Large Self-Structuring Networks., , and . INFOCOM, page 71-78. IEEE Computer Society, (1999)Traffic Monitoring and Anomaly Detection based on Simulation of Luxembourg Road Network., , , , and . ITSC, page 382-387. IEEE, (2019)