Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FlexFlow: A Flexible Flow Control Policy Specification Framework., , and . DBSec, volume 142 of IFIP, page 358-371. Kluwer/Springer, (2003)Estimating the Number of Nodes in a Mobile Wireless Network.. GLOBECOM, page 1-5. IEEE, (2010)P2P-Based Web Text Information Retrieval., and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 247-252. Springer, (2005)Cost-Efficient Stream Processing on the Cloud., , , and . CLOUD, page 209-213. IEEE, (2019)TruXy: Trusted Storage Cloud for Scientific Workflows., , , , , , , and . IEEE Trans. Cloud Computing, 5 (3): 428-442 (2017)Malytics: A Malware Detection Scheme., , , and . CoRR, (2018)Flow-Sensitive Type-Based Heap Cloning (Artifact)., , and . Dagstuhl Artifacts Ser., 6 (2): 01:1-01:2 (2020)APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home., , , , , , and . IEEE Access, (2019)A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment., , , , and . Int. J. Web Serv. Res., 14 (4): 50-74 (2017)Edge Learning for Surveillance Video Uploading Sharing in Public Transport Systems., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (4): 2274-2285 (2021)