Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adapting a Software Product Line Engineering Process for Certifying Safety Critical Embedded Systems., , , , and . SAFECOMP, volume 7612 of Lecture Notes in Computer Science, page 352-363. Springer, (2012)Comparison and Analysis of Cryptographic Algorithms Aiming Performance Improvement in Secure Web Services., , , and . HASE, page 191-192. IEEE Computer Society, (2011)Analysis and Identification of Evil Twin Attack through Data Science Techniques Using AWID3 Dataset., , , and . MLMI, page 128-135. ACM, (2023)Tiriba - a new approach of UAV based on model driven development and multiprocessors., , , , , and . ICRA, IEEE, (2011)Parallel implementation of mobile robotic self-localization., , , and . ICHIT, volume 321 of ACM International Conference Proceeding Series, page 390-396. ACM, (2009)Analysis of Scheduling Techniques in Distributed Parallel Environments Using Mobile Agents., , and . ICNS, page 96-101. IEEE Computer Society, (2008)Performance evaluation of a CMB protocol., , , , and . WSC, page 1012-1019. IEEE Computer Society, (2006)Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer., , , and . J. Netw. Comput. Appl., (2016)Cloud-SPHERE: Towards Secure UAV Service Provision., and . Journal of Intelligent and Robotic Systems, 97 (1): 249-268 (2020)Application of SOA in Safety-Critical Embedded Systems., , , , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 345-354. Springer, (2011)