Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IO-MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering., , and . Wireless Personal Communications, 72 (2): 1467-1473 (2013)Dynamics of Modeling in Data Mining: Interpretive Approach to Bankruptcy Prediction., , and . J. Manag. Inf. Syst., 16 (1): 63-86 (1999)An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks., , , , and . Peer-to-Peer Netw. Appl., 8 (4): 684-693 (2015)Converting the Point of View of Message Spoken to Virtual Assistants., , , , , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 154-163. Association for Computational Linguistics, (2020)Effective Web-Related Resource Security Using Distributed Role Hierarchy., , , and . WAIM, volume 3129 of Lecture Notes in Computer Science, page 87-96. Springer, (2004)Centralized Contention Based MAC for OFDMA WLAN., and . IEICE Trans. Inf. Syst., 100-D (9): 2219-2223 (2017)Aberration Estimation for Synthetic Aperture Digital Holographic Microscope Using Deep Neural Network., , , and . Sensors, 23 (22): 9278 (November 2023)Lightweight IEC 61850 Secure Communication Module for Microgrids., , and . BWCCA, volume 2 of Lecture Notes on Data Engineering and Communications Technologies, page 443-451. Springer, (2016)Training Neural Networks with Low Precision Dynamic Fixed-Point., , , and . ICCD, page 405-408. IEEE Computer Society, (2018)RPS: An Extension of Reference Monitor to Prevent Race-Attacks., , , and . PCM (1), volume 3331 of Lecture Notes in Computer Science, page 556-563. Springer, (2004)