Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flight Risk Probabilities During Wake Encountering Using Multivariate Copula Model., , , and . FSDM, volume 281 of Frontiers in Artificial Intelligence and Applications, page 200-205. IOS Press, (2015)Mining Competitive Intelligence from Social Media: A Case Study of IBM., , and . PACIS, page 313. (2018)Biometric verification using hand vein-patterns.. WCNIS, page 677-681. IEEE, (2010)A Data Protection Scheme via Isolating Android Partitions., , , , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 89-101. Springer, (2019)HACA3: A unified approach for multi-site MR image harmonization., , , , , , , , , and 3 other author(s). Comput. Medical Imaging Graph., (October 2023)Understanding bandwidth-delay product in mobile ad hoc networks., , , and . Comput. Commun., 27 (10): 923-934 (2004)An R package for model fitting, model selection and the simulation for longitudinal data with dropout missingness., , , , and . Commun. Stat. Simul. Comput., 48 (9): 2812-2829 (2019)Hierarchical control of multiple resources in distributed real-time and embedded systems., , , , and . Real Time Syst., 39 (1-3): 237-282 (2008)A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints., , , and . Future Gener. Comput. Syst., (2020)Service offloading oriented edge server placement in smart farming., , , , , and . Softw. Pract. Exp., 51 (12): 2540-2557 (2021)