Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Detect Fake Profiles in Social Networks Using Cellular Automata-Based PageRank Validation Model Involving Energy Transfer., , , and . SN Comput. Sci., 3 (6): 423 (2022)A Novel Intelligent Modeling of Storage and Bandwidth Constraints in Distributed Storage Allocation., , , and . CICBA (2), volume 776 of Communications in Computer and Information Science, page 336-346. Springer, (2017)PROWESS: An Open Testbed for Programmable Wireless Edge Systems., , , , , , , , and . PEARC, page 11:1-11:9. ACM, (2022)Decision making in assessment of RRAP of WSN using fuzzy-hybrid approach., , , and . IEEE ANTS, page 1-6. IEEE, (2015)HORCRUX: Accurate Cross Band Channel Prediction., , , , and . MobiCom, page 1-15. ACM, (2024)Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy., , , , and . J. Supercomput., 78 (8): 11015-11050 (2022)ReFleX: Enabling Full Duplex Relay Cluster., , and . COMSNETS, page 563-571. IEEE, (2023)Programming by voice: a hands-free approach for motorically challenged children., , , , , and . CHI Extended Abstracts, page 2087-2092. ACM, (2012)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO Systems., , , and . WISEC, page 162-173. ACM, (2024)