Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Password-Based Authentication: Preventing Dictionary Attacks, and . IEEE Computer, 40 (6): 68 -- 74 (June 2007)Guest Editors' Note., and . Pervasive Mob. Comput., 2 (2): 109-110 (2006)Checkpointing with mutable checkpoints., and . Theor. Comput. Sci., 290 (2): 1127-1148 (2003)Load-Balanced Location Management for Cellular Mobile Systems Using Quorums and Dynamic Hashing., , and . Wirel. Networks, 7 (5): 497-512 (2001)Recurrent Nerual Imaging: An Evolutionary Approach for Mixed Possion-Gaussian Image Denoising., , , , and . ICMLA, page 484-489. IEEE, (2022)Multi-Stage Gaussian Noise Reduction with Recurrent Neural Networks., , , and . ACSCC, page 135-139. IEEE, (2021)A Simultaneous Key Generation Technique for Health Information Exchange (HIE) Based on Existing Patients' Credentials., and . CHASE, page 359-361. IEEE Computer Society, (2016)Carpooling in Mobile Ad Hoc Networks: the Case of Multiple-Target Route Discovery., and . WiOpt, page 1-9. IEEE, (2007)Analysis of the Probability of Transaction Abort and Throughput of Two Timestamp Ordering Algorithms for Database Systems.. IEEE Trans. Knowl. Data Eng., 3 (2): 261-266 (1991)An Improved O(log N) Mutual Exclusion Algorithm for Distributed Systems., , and . ICPP (3), page 295-302. Pennsylvania State University Press, (1990)0-271-00728-1.