Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neighbourhood-Pair Attack in Social Network Data Publishing., and . MobiQuitous, volume 131 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 726-731. Springer, (2013)Secure Object Tracking Protocol for the Internet of Things., , and . IEEE Internet of Things Journal, 3 (4): 544-553 (2016)Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes., , , and . IJDWM, 9 (4): 1-18 (2013)A RFID architecture framework for global supply chain applications., and . iiWAS, page 313-320. ACM, (2009)An Efficient Replicated Data Management Approach for Peer-to-Peer Systems.. International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 457-463. Springer, (2005)A Unified Resource Scheduling Approach on Cluster Computing Systems., and . PDCS, page 43-48. ISCA, (2003)Robust Parallel Job Scheduling Infrastructure for Service-Oriented Grid Computing Systems.. ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1272-1281. Springer, (2005)Design and Evaluation of an Agent-Based Communication Model for a Parallel File System., , , , and . ICCSA (2), volume 3044 of Lecture Notes in Computer Science, page 87-96. Springer, (2004)EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database., , , , and . ICCCI (2), volume 7654 of Lecture Notes in Computer Science, page 29-38. Springer, (2012)An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches., , , and . Appl. Soft Comput., (2020)