Author of the publication

Experimentation and Analysis of Ensemble Deep Learning in IoT Applications.

, , , , and . Open J. Internet Things, 5 (1): 133-149 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Firewall Queries., , , and . OPODIS, volume 3544 of Lecture Notes in Computer Science, page 197-212. Springer, (2004)Experimentation and Analysis of Ensemble Deep Learning in IoT Applications., , , , and . Open J. Internet Things, 5 (1): 133-149 (2019)Identifying Fake Feedback for Effective Trust Management in Cloud Environments., , , , and . ICSOC Workshops, volume 7759 of Lecture Notes in Computer Science, page 47-58. Springer, (2013)Discovery and cataloging of deep Web sources., , , and . IRI, page 224-230. IEEE, (2012)Flexible IoT middleware for integration of things and applications., , and . CollaborateCom, page 481-488. ICST / IEEE, (2014)Query optimisation in multidatabase systems using query classification., , and . SAC, page 173-177. ACM, (1996)Aggregated Search over Personal Process Description Graph., , , and . DEXA (2), volume 9828 of Lecture Notes in Computer Science, page 254-262. Springer, (2016)Automatic Mash Up of Composite Applications., , , and . ICSOC, volume 5364 of Lecture Notes in Computer Science, page 317-330. (2008)Social-PPM: Personal Experience Sharing and Recommendation., , and . CIC, page 29-36. IEEE Computer Society, (2016)Semantic Brokering over Dynamic Heterogeneous Data Sources in InfoSleuth., , and . ICDE, page 358-365. IEEE Computer Society, (1999)