Author of the publication

Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms.

, , , and . ICICA (LNCS), volume 7473 of Lecture Notes in Computer Science, page 299-306. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active warden as the main hindrance for steganography information retrieval., , , , and . CAMP, page 277-280. IEEE, (2012)Effective mining on large databases for intrusion detection., , , , and . ISBAST, page 204-207. IEEE, (2014)Using process mining to business process distribution., , , and . SAC, page 2140-2145. ACM, (2009)Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation., , , and . FNC/MobiSPC, volume 56 of Procedia Computer Science, page 370-375. Elsevier, (2015)Towards secure model for SCADA systems., , , , and . CyberSec, page 60-64. IEEE, (2012)A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database., , , , and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 894-901. Elsevier, (2012)A Hybrid Scheme for Face Template Protection., , , and . IMCOM, page 6:1-6:7. ACM, (2016)Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification., , , , and . ICARIS, volume 5132 of Lecture Notes in Computer Science, page 132-141. Springer, (2008)Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database., , , , and . iiWAS, page 190-199. ACM, (2018)Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems., , , and . J. Comput. Sci., 10 (8): 1380-1388 (2014)