From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An empirical evaluation of cross project priority prediction., , и . Int. J. Syst. Assur. Eng. Manag., 5 (4): 651-663 (2014)Using PSO in a spatial domain based image hiding scheme with distortion tolerance., , и . Comput. Electr. Eng., 39 (2): 640-654 (2013)Predicting the priority of a reported bug using machine learning techniques and cross project validation., , , и . ISDA, стр. 539-545. IEEE, (2012)A Self-organizing Self-healing On-demand Loop-free Path Routing Protocol Using Mobile Process Groups for Mobile Ad-hoc Networks., и . ARTCom, стр. 396-400. IEEE Computer Society, (2009)Avoiding Threats Using Multi Agent System Planning for Web Based Systems., , , , и . ICCCI, том 5796 из Lecture Notes in Computer Science, стр. 709-719. Springer, (2009)Blind Quantitative Steganalysis using SVD Features., и . ICACCI, стр. 369-374. IEEE, (2018)Intelligent wavelet domain watermarking of fingerprint images., , и . HIS, стр. 90-95. IEEE, (2012)Steganography using Cuckoo Optimized Wavelet Coefficients., и . WCI, стр. 365-370. ACM, (2015)Securing fingerprint images using a hybrid technique., , и . ICACCI, стр. 557-565. ACM, (2012)MARST: Multi-Agent Recommender System for e-Tourism Using Reputation Based Collaborative Filtering., , , и . DNIS, том 8381 из Lecture Notes in Computer Science, стр. 189-201. Springer, (2014)