Author of the publication

Capacity Enhancing Techniques for High Throughput Satellite Communications.

, , , , , , , , , , , , and . WISATS, volume 154 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-91. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity Enhancing Techniques for High Throughput Satellite Communications., , , , , , , , , and 3 other author(s). WISATS, volume 154 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 77-91. Springer, (2015)A decision support system for the diagnosis of melanoma: A comparative approach., , , and . Expert Syst. Appl., 38 (12): 15217-15223 (2011)A goal programming approach to vehicle routing problems with soft time windows., , , and . European Journal of Operational Research, 177 (3): 1720-1733 (2007)Computerized Three-Dimmensional Craniofacial Reconstruction from Skulls Based on Landmarks., , , , and . FedCSIS, page 729-735. (2011)Comfort and Security Perception of Biometrics in Mobile Phones with Widespread Sensors., , , , , and . SRDS Workshop, page 13-18. IEEE, (2016)Flooding-based segmentation for contactless hand biometrics oriented to mobile devices., , , , and . IET Biom., 7 (5): 431-438 (2018)A Computer Application for 3D Craniofacial Reconstruction and Automatic Skull-Photo Identification., , , and . IJCSA, 9 (3): 108-127 (2012)gb2sμMOD: A MUltiMODal biometric video database using visible and IR light., , , , , , and . Information Fusion, (2016)A Configurable Multibiometric System for Authentication at Different Security Levels Using Mobile Devices., , , and . SRDS Workshop, page 19-24. IEEE, (2016)Analysis of health professional security behaviors in a real clinical setting: An empirical study., , , , , and . I. J. Medical Informatics, 84 (6): 454-467 (2015)