Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A development of power consumption measurement system for Android smartphones., , , , and . IMCOM, page 95. ACM, (2017)Mining Information of Anonymous User on a Social Network Service., , , , , and . ASONAM, page 450-453. IEEE Computer Society, (2011)Distributed File Discovery Protocol in Mobile Peer-to-Peer Networks., , and . NCM (1), page 335-340. IEEE Computer Society, (2008)A Data Sanitization Method for Privacy Preserving Data Re-publication., , , , and . NCM (2), page 28-31. IEEE Computer Society, (2008)978-0-7695-3322-3.An Efficient Top-K Query Processing Method for Location Based Services., , and . ICAIP, page 201-204. ACM, (2017)A Semantic Context-Aware Access Control in Pervasive Environments., , , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 165-174. Springer, (2006)Association Rule Extraction from XML Stream Data for Wireless Sensor Networks., , , and . Sensors, 14 (7): 12937-12957 (2014)Predictive Model for Protein Function Using Modular Neural Approach., , , , and . ICAPR (1), volume 3686 of Lecture Notes in Computer Science, page 400-409. Springer, (2005)A Simple Yet Efficient Approach for Maximal Frequent Subtrees Extraction from a Collection of XML Documents., and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 94-103. Springer, (2006)Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees., , , , , and . KES (1), volume 4692 of Lecture Notes in Computer Science, page 672-679. Springer, (2007)