Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis., , and . ANTS, page 1-6. IEEE, (2016)Energy Efficient Online Scheduling of Real Time Tasks on Large Multi-threaded Multiprocessor Systems., , and . J. Inf. Sci. Eng., 34 (6): 1599-1615 (2018)A Trigger Counting Mechanism for Ring Topology., and . ACSC, volume 147 of CRPIT, page 81-87. Australian Computer Society, (2014)The Popular Matching Problem in a (3, 3)-Hypergraph with One-sided Preferences., and . CANDARW, page 121-127. IEEE, (2023)An Incremental Algorithm for (2-ε)-Approximate Steiner Tree Requiring O(n) Update Time., and . candar, page 168-174. IEEE, (2023)Bounded Clustering with Low Node-Clusterhead Separation in Wireless Sensor Networks., and . ISPAN, page 268-273. IEEE Computer Society, (2005)Energy Efficient Scheduling of Real Time Tasks on Large Systems., , and . PDCAT, page 99-104. IEEE Computer Society, (2016)Hierarchical topology adaptation for distributed convergecast applications., , , and . SAC, page 405-407. ACM, (2014)Dynamic Tree Switching for Distributed Message-Passing Applications., , , and . J. Netw. Syst. Manag., 23 (1): 1-40 (2015)Distributed deterministic 1-2 skip list for peer-to-peer system., , and . Peer-to-Peer Netw. Appl., 8 (1): 63-86 (2015)