Author of the publication

Investigation of the waste-removal chain through pervasive computing.

, , , , , , , , and . IBM Journal of Research and Development, 55 (1): 11 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On detecting active worms with varying scan rate., , , , and . Computer Communications, 34 (11): 1269-1282 (2011)Feature Testing of Communications Protocols.. ICCCN, IEEE Computer Society, (1995)Authentication and authorization protocol security property analysis with trace inclusion transformation and online minimization., and . ICNP, page 164-173. IEEE Computer Society, (2010)Robotic sensing for the partially sighted., , , , and . Robotics and Autonomous Systems, 26 (2-3): 185-201 (1999)Environmental Information System for Waste Electrical Electronic Equipment (WEEE) Managent: Case Study of Pernambuco (Brazil)., , , , , and . EnviroInfo, page 429-436. BIS-Verlag, (2014)Analysing Forests Using Dense Point Clouds., , , , , , and . IVCNZ, page 1-6. IEEE, (2018)Testing IP Routing Protocols - From Probabilistic Algorithms to a Software Tool., , , and . FORTE, volume 183 of IFIP Conference Proceedings, page 249-264. Kluwer, (2000)Validation-Based Test Sequence Generation for Networks of Extended Finite State Machines., , and . FORTE, volume 69 of IFIP Conference Proceedings, page 403-418. Chapman & Hall, (1996)Approximate evaluations of characteristic polynomials of Boolean functions., and . Theor. Comput. Sci., 262 (1): 37-68 (2001)Biased Assimilation, Homophily and the Dynamics of Polarization, , and . CoRR, (2012)