Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workload Hidden Markov Model for Anomaly Detection., , and . SECRYPT, page 56-59. INSTICC Press, (2006)A survey of migration mechanisms of virtual machines., and . ACM Comput. Surv., 46 (3): 30:1-30:33 (2014)A robust model of the neuronal regulator of the lower urinary tract based on artificial neural networks., , , and . Neurocomputing, 71 (4-6): 743-754 (2008)Heart rate variability during high-intensity exercise., , , , , and . J. Systems Science & Complexity, 26 (1): 104-116 (2013)Basketball scoring in NBA games: An example of complexity., , , , , and . J. Systems Science & Complexity, 26 (1): 94-103 (2013)Fast Autonomous Growing Neural Gas., , , , , and . IJCNN, page 725-732. IEEE, (2011)Learning and Comparing Trajectories with a GNG-Based Architecture., , and . DCAI, volume 50 of Advances in Soft Computing, page 644-652. Springer, (2008)Optimizing HANS Color Separation: Meet the CMY Metamers., , and . Color Imaging Conference, page 229-233. IS&T - The Society for Imaging Science and Technology, (2011)Intrusion Risk Analysis and the Power Law Distribution of Attacks.. WOSIS, page 47-52. INSTICC Press, (2004)A Cultural Heritage Application Schema: Achieving Interoperability of Cultural Heritage Data in INSPIRE., , , , , , , and . IJSDIR, (2013)