Author of the publication

A new approach to deploying private mobile network exploits.

, and . J. Supercomput., 72 (1): 46-57 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bringing Vision to the Blind: From Coarse to Fine, One Dollar at a Time., , , , , , and . WACV, page 481-490. IEEE, (2019)The Role of Image Sharing and User's Interactions on Social Media to Promote Handloom Fashion Industry., , and . HCI (37), volume 1088 of Communications in Computer and Information Science, page 315-322. Springer, (2019)On designing a cybersecurity educational program for higher education., and . ICETC, page 195-200. ACM, (2018)Scalable Object Classification Using Range Images., and . 3DIMPVT, page 65-72. IEEE Computer Society, (2011)Robust Recognition and Pose Estimation of 3D Objects Based on Evidence Fusion in a Sequence of Images., , , , , and . ICRA, page 3773-3779. IEEE, (2007)Speaker Verification and Identification Using Principal Component Analysis Based on Global Eigenvector Matrix., , , and . HAIS (1), volume 6076 of Lecture Notes in Computer Science, page 278-285. Springer, (2010)Speaker Verification System Using Extended Sequential Probability Ratio Test in PDA., , , , and . FMN, volume 5630 of Lecture Notes in Computer Science, page 188-193. Springer, (2009)AnisEulerSC: A MATLAB program combined with MTEX for modeling the anisotropic seismic properties of a polycrystalline aggregate with microcracks using self-consistent approximation., , and . Comput. Geosci., (2020)Foundational Models for Malware Embeddings Using Spatio-Temporal Parallel Convolutional Networks., , , , , , , , and . CoRR, (2023)Toxicity Predictions using Compound Descriptions., , , and . DTMBIO@CIKM, page 21. ACM, (2015)