Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A specification model for context-based collaborative applications., , and . Pervasive Mob. Comput., 1 (1): 21-42 (2005)Automatic Electric Meter Reading System: A Cost-Feasible Alternative Approach In Meter Reading For Bangladesh Perspective Using Low-Cost Digital Wattmeter And Wimax Technology, , , and . CoRR, (2012)A New Compression Based Index Structure for Efficient Information Retrieval, , , , and . CoRR, (2012)Exception Handling in CSCW Applications in Pervasive Computing Environments., , and . Advanced Topics in Exception Handling Techniques, volume 4119 of Lecture Notes in Computer Science, page 161-180. Springer, (2006)Bacterial Chemotaxis in Linear and Nonlinear Steady Microfluidic Gradients, , and . Nano Letters, 10 (9): 3379-3385 (2010)A Constructive Review on Pedestrian Action Detection, Recognition and Prediction., , , and . ICCA, page 367-376. ACM, (2022)A Data Warehouse Solution for Analyzing RFID-Based Baggage Tracking Data., , and . MDM (1), page 283-292. IEEE Computer Society, (2013)Mobile Agent Programming in Ajanta., , , , and . ICDCS, page 190-197. IEEE Computer Society, (1999)Hardware/Software Cooperative Design Against Power Side-Channel Attacks on IoT Devices., , , , , and . IEEE Internet Things J., 11 (9): 16758-16768 (May 2024)Capturing hotspots for constrained indoor movement., , and . SIGSPATIAL/GIS, page 462-465. ACM, (2013)