Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrity assurance of mobile agents through public-key encryption and watermarking., and . ICDIM, page 575-580. IEEE, (2008)Process Discovery and Refinement of an Enterprise Management System., , , and . Comput. Syst. Sci. Eng., 44 (3): 2019-2032 (2023)Concealed Quantum Telecomputation for Anonymous 6G URLLC Networks., , , , and . IEEE J. Sel. Areas Commun., 41 (7): 2278-2296 (July 2023)Quantum Semantic Communications for Metaverse: Principles and Challenges., , , , , and . IEEE Wirel. Commun., 30 (4): 26-36 (August 2023)Selection of Foundational Ontology for Collaborative Knowledge Modeling in Healthcare Domain., and . AIMSA, volume 6304 of Lecture Notes in Computer Science, page 261-262. Springer, (2010)Analysis of the Petri net model of parallel manufacturing processes with shared resources, , and . Information Sciences, (July 2011)Scenario Based Functional Regression Testing Using Petri Net Models., and . ICMLA (2), page 572-577. IEEE, (2013)978-0-7695-5144-9.Coloured Petri Net modeling and analysis for Community based wireless mesh networks., , and . SMC, page 139-144. IEEE, (2014)Petri net-based modeling and control of the multi-elevator systems., , , and . Neural Comput. Appl., 24 (7-8): 1601-1612 (2014)Modeling and analysis of departure routine in air traffic control based on Petri nets., , , , , and . Neural Comput. Appl., 25 (5): 1099-1109 (2014)