Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using elastic nets for correspondence in range data., and . ICNN, page 1908-1913. IEEE, (1993)A declarative approach for secure and robust routing., , , and . SafeConfig, page 45-52. ACM, (2010)Schema-free structured querying of DBpedia data., , and . CIKM, page 2090-2093. ACM, (2012)A Secure Infrastructure for Service Discovery and Access in Pervasive Computing., , , , and . Mob. Networks Appl., 8 (2): 113-125 (2003)Threshold-based intrusion detection in ad hoc networks and secure AODV., , , , , and . Ad Hoc Networks, 6 (4): 578-599 (2008)On the problem of correspondence in range data and some inelastic uses for elastic nets., and . IEEE Trans. Neural Networks, 6 (3): 716-723 (1995)Using OWL in a Pervasive Computing Broker., , and . OAS, volume 73 of CEUR Workshop Proceedings, page 9-16. CEUR-WS.org, (2003)User interests in social media sites: an exploration with micro-blogs., , , , , , , and . CIKM, page 1823-1826. ACM, (2009)Identifying and characterizing user communities on Twitter during crisis events., , and . DUBMMSM, page 23-26. ACM, (2012)UMBC at SemEval-2018 Task 8: Understanding Text about Malware., , , , , , , and . SemEval@NAACL-HLT, page 878-884. Association for Computational Linguistics, (2018)