Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive analytical approach for policy analysis of system dynamics models., , , and . European Journal of Operational Research, 203 (3): 673-683 (2010)A game-theoretic framework for specification and verification of cryptographic protocols., and . Formal Asp. Comput., 22 (5): 585-609 (2010)Security Evaluation of J2ME CLDC Embedded Java Platform., , , and . Journal of Object Technology, 5 (2): 125-154 (2006)A Novel Dynamic Pricing Model for the Telecommunications Industry., , and . MCO (2), volume 360 of Advances in Intelligent Systems and Computing, page 129-140. Springer, (2015)Cross-Country Skiing Gears Classification using Deep Learning., , and . CoRR, (2017)Performance and Dependability Evaluation of Distributed Event-based Systems: A Dynamic Code-injection Approach., , , and . ICPE, page 349-352. ACM, (2017)Daemo: A Self-Governed Crowdsourcing Marketplace., , , , , , , , , and 60 other author(s). UIST (Adjunct Volume), page 101-102. ACM, (2015)Prioritization of Public Expenditure for a Better Return on Social Development: A Data Mining Approach., , , , , and . AMLTA, volume 488 of Communications in Computer and Information Science, page 523-530. Springer, (2014)Forensic analysis of logs: Modeling and verification., , , and . Knowl.-Based Syst., 20 (7): 671-682 (2007)Estimating market shares in each market segment using the information entropy concept.. Applied Mathematics and Computation, 190 (2): 1735-1739 (2007)