Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building sankie: an AI platform for DevOps., , , , , and . BotSE@ICSE, page 48-53. IEEE / ACM, (2019)LEGO: Leveraging Experience in Roadmap Generation for Sampling-Based Planning., , , and . IROS, page 1488-1495. IEEE, (2019)ITMS (Intelligent Traffic Management System)., and . SocProS (1), volume 436 of Advances in Intelligent Systems and Computing, page 487-495. Springer, (2015)Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure., , , and . COMSNETS, page 1-6. IEEE, (2020)Cyberkids: Children in the Information Age, Sarah L. Holloway and Gill Valentine.. Educ. Inf. Technol., 8 (4): 383-386 (2003)Heuristic and Statistical Power Estimation Model for FPGA Based Wireless Systems., , , , , , and . Wirel. Pers. Commun., 106 (4): 2087-2098 (2019)ROM integrated vibration control of stochastically parametered flexible structures., , and . SICE, page 1797-1802. IEEE, (2020)The Kerala flood of 2018: combined impact of extreme rainfall and reservoir storage, , , , , and . Hydrology and Earth System Sciences Discussions, (September 2018)Malware Detection Approach for Android systems Using System Call Logs., , , and . CoRR, (2017)Spotting Earnings Manipulation: Using Machine Learning for Financial Fraud Detection., , and . SGAI Conf., volume 11311 of Lecture Notes in Computer Science, page 343-356. Springer, (2018)