Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

P2P soft security: On evolutionary dynamics of P2P incentive mechanism., , , and . Comput. Commun., 34 (3): 241-249 (2011)The Future of Healthcare Internet of Things: A Survey of Emerging Technologies., , , , and . IEEE Commun. Surv. Tutorials, 22 (2): 1121-1167 (2020)A new approach to the design of reinforcement schemes for learning automata: Stochastic estimator learning algorithm., and . Neurocomputing, 7 (3): 275-297 (1995)Fast and scalable distributed deep convolutional autoencoder for fMRI big data analytics., , , , and . Neurocomputing, (2019)A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications., , , , , , , , and . IEEE Syst. J., 5 (4): 574-583 (2011)Socially Aware Networking: A Survey., , , , and . IEEE Syst. J., 9 (3): 904-921 (2015)VPEF: A Simple and Effective Incentive Mechanism in Community-Based Autonomous Networks., , and . IEEE Trans. Netw. Serv. Manag., 12 (1): 75-86 (2015)Ultra-real or symbolic visualization? The case of the city through time., and . Comput. Graph., 30 (2): 299-310 (2006)Cloud robotics: Current status and open issues., , , , , and . IEEE Access, (2016)Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health., , , and . IEEE Trans. Cloud Comput., 11 (3): 2839-2855 (July 2023)