Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparing the Performance of TCP/IP with Named Data Networking Using ns-3., and . IC3, page 560-563. ACM, (2022)Adaptive neural controller for cooperative multiple robot manipulator system manipulating a single rigid object., , , and . Appl. Soft Comput., 12 (1): 216-227 (2012)Adaptive Hypermedia Systems - A Requirement's Perspective., and . IMSA, page 377-382. IASTED/ACTA Press, (2005)Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System., , and . TrustCom/BigDataSE/ISPA (1), page 1249-1254. IEEE, (2015)Comprehensive evaluation of key management hierarchies for outsourced data., and . Cybersecurity, 2 (1): 8 (2019)Non-additive multi-objective robot coalition formation., , and . Expert Syst. Appl., 41 (8): 3736-3747 (2014)Achieving Zero ms Handover Interruption in New Radio with Higher Throughput Using D2D Communication., , and . WCNC, page 1-8. IEEE, (2019)BEAN: a lightweight stream cipher., , , and . SIN, page 168-171. ACM, (2009)Object classification in sidescan sonar images with sparse representation techniques., , and . ICASSP, page 1333-1336. IEEE, (2012)Multimodal Representation of Advertisements Using Segment-level Autoencoders., , , and . ICMI, page 418-422. ACM, (2018)