Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fonseca, Keiko Ono
add a person with the name Fonseca, Keiko Ono
 

Other publications of authors with the same name

Remote RF and Baseband Video Measurement Laboratory Based Upon Open-Code Software., , , , and . IEEE Trans. Instrumentation and Measurement, 57 (3): 556-564 (2008)Congestion Potential - A New Way to Analyze Public Transportation based on Complex Networks., , , , and . ISC2, page 1-8. IEEE, (2018)TCP TS-Prio: An Approach to end-to-end service differentiation for DiffServ AF classes., and . AICT/ICIW, page 45. IEEE Computer Society, (2006)Cloud Challenge: Secure End-to-End Processing of Smart Metering Data., , , , , , , , , and 5 other author(s). UCC Companion, page 36-42. IEEE, (2018)Open Code Application for Web-Based Remote Measurements., , , and . AICT/ICIW, page 13. IEEE Computer Society, (2006)Development of Open Code Application for Remote Measurements., , , and . ICETE (1), page 33-38. INSTICC Press, (2004)Evaluating Electric Bus Operation for a Real-World BRT Public Transportation Using Simulation Optimization., , and . IEEE Trans. Intelligent Transportation Systems, 17 (10): 2777-2786 (2016)Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation Procedures., , , and . IEEE Symposium on Security and Privacy Workshops, page 65-68. IEEE Computer Society, (2014)HyperBone: A Scalable Overlay Network Based on a Virtual Hypercube., , , and . CCGRID, page 58-64. IEEE Computer Society, (2008)Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments., , , , , , , , and . CloudCom, page 243-246. IEEE Computer Society, (2018)