Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Qualitative Comparison of MPSoC Mobile and Embedded Virtualization Techniques., , and . CoRR, (2016)A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb., , , , and . IEEE Communications Letters, 24 (4): 744-747 (2020)A comparative study of location-based recommendation systems., , and . Knowl. Eng. Rev., (2017)Incremental proxy re-encryption scheme for mobile cloud computing environment., , , , , and . J. Supercomput., 68 (2): 624-651 (2014)Towards secure mobile cloud computing: A survey., , , and . Future Gener. Comput. Syst., 29 (5): 1278-1299 (2013)Resource management in cloud computing: Taxonomy, prospects, and challenges., , , , and . Comput. Electr. Eng., (2015)A traffic flow-oriented routing protocol for VANETs., , , , and . EURASIP J. Wirel. Commun. Netw., (2014)Diet-Right: A Smart Food Recommendation System., , , , , and . KSII Trans. Internet Inf. Syst., 11 (6): 2910-2925 (2017)Stable-path multi-channel routing with extended level channel assignment., , , , and . Int. J. Commun. Syst., 25 (7): 887-902 (2012)Object Recognition Using Simulated Evolution on Fourier Descriptors., , , and . WSC, volume 75 of Advances in Intelligent and Soft Computing, page 205-213. Springer, (2009)