Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online Romance Scam: Expensive e-Living for romantic happiness., , , and . Bled eConference, page 36. (2016)A Technique for Parallel Share-frequent Sensor Pattern Mining from Wireless Sensor Networks., , and . ICCS, volume 29 of Procedia Computer Science, page 124-133. Elsevier, (2014)Missing Value Imputation Framework for Microarray Significant Gene Selection and Class Prediction., , and . BioDM, volume 3916 of Lecture Notes in Computer Science, page 131-142. Springer, (2006)Carry me if you can: A utility based forwarding scheme for content sharing in tourist destinations., , , and . APCC, page 261-267. IEEE, (2016)Blockchain Leveraged Task Migration in Body Area Sensor Networks., , , and . APCC, page 177-184. IEEE, (2019)A new resource distribution model for improved QoS in an integrated WiMAX/WiFi architecture., , , and . IWCMC, page 266-271. IEEE, (2011)Dynamic Dwell Timer for Hybrid Vertical Handover in 4G Coupled Networks., , and . VTC Spring, page 1-5. IEEE, (2011)VSAMS: Video Stabilization Approach for Multiple Sensors., , and . DICTA, page 411-416. IEEE Computer Society, (2010)Gene Expression Imputation Techniques for Robust Post Genomic Knowledge Discovery., , and . Computational Intelligence in Medical Informatics, volume 85 of Studies in Computational Intelligence, Springer, (2008)An Anomaly Intrusion Detection System Using C5 Decision Tree Classifier., , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 149-155. Springer, (2018)