Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure M-commerce Transactions: A Third Party Based Signature Protocol., , , and . IAS, page 3-8. IEEE Computer Society, (2007)A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services., , and . SEC, volume 214 of IFIP Conference Proceedings, page 239-250. Kluwer, (2002)Webcam classification using simple features., , , , , , and . Computational Imaging, volume 9401 of SPIE Proceedings, page 94010G. IS&T/SPIE, (2015)Diagnosability of optical multi-mesh hypercube networks under the comparison diagnosis model., , and . Int. J. Comput. Math., 90 (9): 1774-1781 (2013)K-Means on Commodity GPUs with CUDA., , , , and . CSIE (3), page 651-655. IEEE Computer Society, (2009)Routing and wavelength assignment for 3-ary n-cube communication patterns in linear array optical networks for n communication rounds., , , and . Inf. Process. Lett., 113 (18): 677-680 (2013)Geochemistry of basalts from IODP site U1365: Implications for magmatism and mantle source signatures of the mid-Cretaceous Osbourn Trough, , , , , , and . Lithos, (April 2012)Kernel K-Means Sampling for Nyström Approximation., and . IEEE Trans. Image Processing, 27 (5): 2108-2120 (2018)An Efficient Multi-layer Grid Method for Skyline Queries in Distributed Environments., , and . DASFAA Workshops, volume 6637 of Lecture Notes in Computer Science, page 112-119. Springer, (2011)Understanding usage and value of audit analytics for internal auditors: An organizational approach., , , and . Int. J. Account. Inf. Syst., (2018)