Author of the publication

An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management.

, , , , and . CCWC, page 589-596. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strong QoS and Collision Control in WLAN Mesh and Ubiquitous Networks., and . SUTC, page 20-27. IEEE Computer Society, (2008)A Framework Using Machine Vision and Deep Reinforcement Learning for Self-Learning Moving Objects in a Virtual Environment., , , and . AAAI Fall Symposia, page 231-237. AAAI Press, (2017)Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANs., and . ICPADS, page 1-5. IEEE Computer Society, (2007)Attention-based Learning for Missing Data Imputation in HoloClean., , , and . MLSys, mlsys.org, (2020)An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management., , , , and . CCWC, page 589-596. IEEE, (2024)Evaluation of NUMA-Aware Scheduling in Warehouse-Scale Clusters., , , , , and . CLOUD, page 475-477. IEEE, (2019)A 64Mb SRAM in 22nm SOI technology featuring fine-granularity power gating and low-energy power-supply-partition techniques for 37% leakage reduction., , , , , , , , , and 1 other author(s). ISSCC, page 322-323. IEEE, (2013)Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information Retrieval., , and . ICITA (2), page 35-40. IEEE Computer Society, (2005)LDC-CM: A Novel Model for Dynamic Cache Size Adjustment., , and . International Conference on Internet Computing, page 753-758. CSREA Press, (2003)A Novel Real-Time Self-similar Traffic Detector/Filter to Improve the Reliability of a TCP Based End-to-End Client/Server Interaction Path for Shorter Roundtrip Time., , , and . ICETE (Selected Papers), volume 3 of Communications in Computer and Information Science, page 49-61. (2005)