default search action
Renato Levy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [p3]Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Renato Levy:
Vulnerability Detection and Analysis in Adversarial Deep Learning. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 211-234 - 2015
- [c14]Gedare Bloom, Bhagirath Narahari, Rahul Simha, Ali Namazi, Renato Levy:
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets. HOST 2015: 48-51 - 2014
- [p2]Renato Levy, Goutam Satapathy:
Design and Implementation of Very Large Agent-Based Systems. Agent-Oriented Software Engineering 2014: 289-307 - 2013
- [c13]Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Alexey Bogaevskiy, Jason H. Li, Yalin Evren Sagduyu, Renato Levy:
Mobile network performance evaluation using the radio frequency network channel emulation simulation tool(RFnest™). MobiCom 2013: 155-158 - 2012
- [p1]Joaquín Peña, Renato Levy, Mike Hinchey, Antonio Ruiz Cortés:
Dealing with Complexity in Agent-Oriented Software Engineering: The Importance of Interactions. Conquering Complexity 2012: 191-214 - [e1]Klaus Fischer, Jörg P. Müller, Renato Levy:
Agent-Based Technologies and Applications for Enterprise Interoperability - International Workshops ATOP@AAMAS 2009, Budapest, Hungary, May 12, 2009, and ATOP@AAMAS 2010, Toronto, ON, Canada, May 10, 2010, Revised Selected Papers. Lecture Notes in Business Information Processing 98, Springer 2012, ISBN 978-3-642-28562-2 [contents] - 2011
- [c12]Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Jason H. Li, Yalin E. Sagduyu, Renato Levy:
RFnest™: Radio frequency network emulator simulator tool. MILCOM 2011: 1882-1887 - 2010
- [c11]Renato Levy, Jakob Henriksson, Margaret Lyell, Xiong Liu, Michael J. Mayhew:
Ontology Matching across Domains. ATOP@AAMAS 2010: 95-113 - [c10]Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:
Using Bayesian networks for cyber security analysis. DSN 2010: 211-220
2000 – 2009
- 2009
- [c9]Margaret Lyell, M. Mejia-Tellez, R. Flo, Leonard S. Haynes, Renato Levy:
Coordinated police agents to manage pedestrian flow in an urban crisis situation. SpringSim 2009 - 2008
- [j5]Jason H. Li, Bobby Bhattacharjee, Miao Yu, Renato Levy:
A scalable key management and clustering scheme for wireless ad hoc and sensor networks. Future Gener. Comput. Syst. 24(8): 860-869 (2008) - [c8]Jason Hongjun Li, Song Luo, Wei Tang, Renato Levy, Kihong Park:
Heavy-Tailed Workload Aware Ad Hoc Routing. ICC 2008: 2437-2442 - [c7]Song Luo, Jason H. Li, Kihong Park, Renato Levy:
Exploiting Heavy-Tailed Statistics for Predictable QoS Routing in Ad Hoc Wireless Networks. INFOCOM 2008: 2387-2395 - 2007
- [c6]Jason H. Li, Renato Levy, Peng Liu:
Intelligent Cyber Security Analysis in Enterprise Networks. AAAI Fall Symposium: Regarding the Intelligence in Distributed Intelligent Systems 2007: 75-78 - 2006
- [j4]Miao Yu, Jason H. Li, Renato Levy:
Mobility Resistant Clustering in Multi-Hop Wireless Networks. J. Networks 1(1): 12-19 (2006) - [j3]Jason H. Li, Miao Yu, Renato Levy, Anna Teittinen:
A Mobility-Resistant Efficient Clustering Approach for ad hoc and sensor networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 10(2): 1-12 (2006) - [c5]Hongmei Deng, Roger Xu, Jason H. Li, Frank Zhang, Renato Levy, Wenke Lee:
Agent-Based Cooperative Anomaly Detection for Wireless Ad Hoc Networks. ICPADS (1) 2006: 613-620 - [c4]Jason H. Li, Renato Levy, Miao Yu, Bobby Bhattacharjee:
A scalable key management and clustering scheme for ad hoc networks. Infoscale 2006: 28 - 2005
- [j2]Joaquín Peña, Renato Levy, Rafael Corchuelo:
Towards clarifying the importance of interactions in Agent-Oriented Software Engineering. Inteligencia Artif. 9(25): 19-28 (2005) - [c3]Jason H. Li, Miao Yu, Renato Levy:
A Distributed Efficient Clustering Approach for Ad Hoc and Sensor Networks. MSN 2005: 937-949 - 2004
- [j1]Renato Levy, James Odell:
Representing Agents and their Systems: A Challenge for Current Moddeling Languages. Informatica (Slovenia) 28(1): 3-11 (2004) - [c2]James Odell, Marian H. Nodine, Renato Levy:
A Metamodel for Agents, Roles, and Groups. AOSE 2004: 78-92 - 2000
- [c1]Kutluhan Erol, Jun Lang, Renato Levy:
Designing agents from reusable components. Agents 2000: 76-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint