Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DPKI: A Blockchain-Based Decentralized Public Key Infrastructure System., , , and . GIoTS, page 1-5. IEEE, (2020)The Computing Fleet: Managing Microservices-based Applications on the Computing Continuum., , , , , and . ICSA Companion, page 40-44. IEEE, (2022)Deep Convolutional Neural Networks for efficient vision based tunnel inspection., , , , and . ICCP, page 335-342. IEEE, (2015)ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context., and . ARES, page 103:1-103:6. ACM, (2022)Deep Learning-Based Man-Made Object Detection from Hyperspectral Data., , , and . ISVC (1), volume 9474 of Lecture Notes in Computer Science, page 717-727. Springer, (2015)Integrated Solution for Industrial IoT Data Security - the CHARIOT Solution., , , , , , , , , and 8 other author(s). SAM IoT, volume 2739 of CEUR Workshop Proceedings, page 11-18. CEUR-WS.org, (2020)Robotic intelligent vision and control for tunnel inspection and evaluation - The ROBINSPECT EC project., , , , , , , , , and 3 other author(s). ROSE, page 72-77. IEEE, (2014)An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management., , , , , , , , , and 10 other author(s). ARES, page 98:1-98:6. ACM, (2023)Cognition Enabled IoT Platform for Industrial IoT Safety, Security and Privacy - The CHARIOT Project., , , , , , , , , and 3 other author(s). CAMAD, page 1-4. IEEE, (2019)Variational Inference for Background Subtraction in Infrared Imagery., , and . ISVC (1), volume 9474 of Lecture Notes in Computer Science, page 693-705. Springer, (2015)