Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using game theory and Bayesian networks to optimize cooperation in ad hoc wireless networks., , , , and . ICC, page 5178-5184. IEEE, (2012)A network of cooperative learners for data-driven stream Mining., and . ICASSP, page 2908-2912. IEEE, (2014)Context-adaptive big data stream mining., , and . Allerton, page 483-490. IEEE, (2014)Real-time stream mining: online knowledge extraction using classifier networks., and . IEEE Netw., 29 (5): 10-16 (2015)Experimental Testing and Impact Analysis of Jamming and Spoofing Attacks on Professional GNSS Receivers., , , , , , , , and . ICL-GNSS (Work in Progress), volume 3183 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Statistical Characterization of Snapshot OSNMA Spoofing Detection., , , , , , and . ICL-GNSS, page 1-6. IEEE, (2023)Relaying in wireless networks modeled through cooperative game theory., , and . CAMAD, page 97-101. IEEE, (2011)A characterization of resource allocation in LTE systems aimed at game theoretical approaches., , , and . CAMAD, page 47-51. IEEE, (2010)A Dynamic Network Formation Model for Understanding Bacterial Self-Organization into Micro-Colonies., , , and . CoRR, (2014)Trajectories of depression: unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis., and . UbiComp, page 1293-1304. ACM, (2015)