Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nieto-Taladriz, Octavio
add a person with the name Nieto-Taladriz, Octavio
 

Other publications of authors with the same name

Architectural Synthesis of Fixed-Point DSP Datapaths Using FPGAs., , , , and . Int. J. Reconfig. Comp., (2009)Evaluating Sequential Combination of Two Genetic Algorithm-Based Solutions for Intrusion Detection., , and . CISIS, volume 53 of Advances in Soft Computing, page 147-154. Springer, (2008)Forecasting Based on Short Time Series Using ANNs and Grey Theory - Some Basic Comparisons., , , and . IWANN (1), volume 6691 of Lecture Notes in Computer Science, page 183-190. Springer, (2011)Fixed-point refinement of OFDM-based adaptive equalizers: An heuristic approach., , , and . EUSIPCO, page 1353-1356. IEEE, (2004)Improving security in WMNs with reputation systems and self-organizing maps., , , , , , , , , and 1 other author(s). J. Network and Computer Applications, 34 (2): 455-463 (2011)Optimal combined word-length allocation and architectural synthesis of digital signal processing circuits., , , , and . IEEE Trans. on Circuits and Systems, 53-II (5): 339-343 (2006)Utilization factor of a distributed system based on an Ethernet network., , and . PDP, page 273-277. IEEE, (1993)Fast characterization of the noise bounds derived from coefficient and signal quantization., , , and . ISCAS (4), page 309-312. IEEE, (2003)Bit-Width Selection for Data-Path Implementations., , and . ISSS, page 114-121. ACM / IEEE Computer Society, (1999)A Scalable Security Framework for Reliable AmI Applications Based on Untrusted Sensors., , , , , and . WWIC, volume 5546 of Lecture Notes in Computer Science, page 73-84. Springer, (2009)