Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing cellular infrastructures: a reflective approach., , , and . ARM@Middleware, page 7-13. ACM, (2011)Recent Advances in Information-Theoretically Secure Data Outsourcing., and . IWSPA@CODASPY, page 31-32. ACM, (2020)Flashback: A Peer-to-PeerWeb Server for Flash Crowds., , , , and . ICDCS, page 15. IEEE Computer Society, (2007)Scheduling sensors for monitoring sentient spaces using an approximate POMDP policy., , , and . PerCom, page 141-150. IEEE Computer Society, (2013)Content-Based Image Retrieval with Relevance Feedback in MARS., , and . ICIP (2), page 815-818. IEEE Computer Society, (1997)Sensor Scheduling for Aggregate Monitoring inWireless Sensor Networks., , and . SSDBM, page 24. IEEE Computer Society, (2007)A Transaction Model for Multidatabase Systems., , , and . ICDCS, page 56-63. IEEE Computer Society, (1992)Gateway designation for timely communications in instant mesh networks., , , and . PerCom Workshops, page 564-569. IEEE Computer Society, (2010)TIPPERS: A privacy cognizant IoT environment., , , and . PerCom Workshops, page 1-6. IEEE Computer Society, (2016)Disambiguation Algorithm for People Search on the Web., , , , and . ICDE, page 1258-1260. IEEE Computer Society, (2007)