Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Negotiation-based coalitions in the physical world., and . AAMAS, page 411-413. ACM, (2006)Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking., , , and . J. Intell. Robotic Syst., 94 (3-4): 687-709 (2019)Visualizing trace of Java collection APIs by dynamic bytecode instrumentation., , and . J. Vis. Lang. Comput., (2017)A mining-based approach for efficient enumeration of algebraic structures., , , and . Int. J. Data Sci. Anal., 1 (2): 89-98 (2016)Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis., , , , and . ISDFS, page 1-6. IEEE, (2022)Design and modeling of energy efficient WSN architecture for tactical applications., , , and . MilCIS, page 1-6. IEEE, (2017)Software Engineering Challenges for Mutable Agent Systems., , , , , and . SELMAS, volume 2940 of Lecture Notes in Computer Science, page 149-166. Springer, (2003)Convoy Driving through Ad-Hoc Coalition Formation., and . IEEE Real-Time and Embedded Technology and Applications Symposium, page 98-105. IEEE Computer Society, (2005)Identifying performance issues based on method invocation patterns of an API., , and . EASE, page 51:1-51:6. ACM, (2014)ClassSpy: Java Object Pattern Visualization Tool., , and . CoRR, (2014)