From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MapIt: a case study for location driven knowledge discovery and mining., , и . Int. J. Data Min. Model. Manag., 5 (1): 57-75 (2013)Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication., , , , и . Comput. Math. Appl., 60 (2): 198-208 (2010)Estimating Twitter User Location Using Social Interactions-A Content Based Approach., , и . SocialCom/PASSAT, стр. 838-843. IEEE Computer Society, (2011)Chaotic and AES cryptosystem for satellite imagery.. Telecommun. Syst., 52 (2): 573-581 (2013)Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device., , , и . BICS, том 7888 из Lecture Notes in Computer Science, стр. 271-277. Springer, (2013)Subjectivity classification and analysis of the ASRS corpus., , и . IRI, стр. 160-165. IEEE Systems, Man, and Cybernetics Society, (2011)Performance Evaluation of Video Streaming in Vehicular Adhoc Network., , и . ISA, том 76 из Communications in Computer and Information Science, стр. 220-224. Springer, (2010)Spam Trapping System: Novel security framework to fight against spam botnets., , , , и . ICT, стр. 467-471. IEEE, (2014)Polymorphic Malware Detection Using Hierarchical Hidden Markov Model., , и . DASC, стр. 151-155. IEEE Computer Society, (2011)Predicted probability enhancement for multi-label text classification using class label pair association., , , и . EAIS, стр. 70-77. IEEE, (2013)