Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Efficient Packet Buffering and Congestion Control Approaches for Reliable Data Delivery in Mobile Ad Hoc Network., , and . IDCS, volume 8223 of Lecture Notes in Computer Science, page 65-77. Springer, (2013)A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing., , , and . FGIT-GDC, volume 63 of Communications in Computer and Information Science, page 57-64. Springer, (2009)An efficient event matching system for semantic smart data in the Internet of Things (IoT) environment., , , and . Future Gener. Comput. Syst., (2019)iRobot-Factory: An intelligent robot factory based on cognitive manufacturing and edge computing., , , , and . Future Gener. Comput. Syst., (2019)CredFinder: A real-time tweets credibility assessing system., , , , and . ASONAM, page 1406-1409. IEEE Computer Society, (2016)ASA: Against statistical attacks for privacy-aware users in Location Based Service., , , , and . Future Gener. Comput. Syst., (2017)Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks., , , , and . Int. J. Distributed Sens. Networks, (2014)Increasing the Trustworthiness in the Industrial IoT Networks Through a Reliable Cyberattack Detection Model., , , and . IEEE Trans. Ind. Informatics, 16 (9): 6154-6162 (2020)Task Offloading and Resource Allocation for Mobile Edge Computing by Deep Reinforcement Learning Based on SARSA., , , , and . IEEE Access, (2020)Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach., , , and . IEEE Access, (2020)