Author of the publication

Delay Efficient Load Balancing Scheme for Component Carrier Selection in Carrier Aggregation in LTE-A.

, , and . VALUETOOLS, ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure architecture design based on application isolation, code minimization and randomization., , and . CNS, page 423-429. IEEE, (2013)A formal proximity model for RBAC systems., , and . CollaborateCom, page 1-10. ICST / IEEE, (2012)Misinformation in Social Networks: Analyzing Twitter During Crisis Events., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Marlin: making it harder to fish for gadgets., , , and . CCS, page 1016-1018. ACM, (2012)Semantic approach to automating management of big data privacy policies., , , , , and . IEEE BigData, page 482-491. IEEE Computer Society, (2016)PeerSense: Who is near you?, , , , and . PerCom Workshops, page 516-518. IEEE Computer Society, (2012)Beyond Wrangling and Modeling: Data Science and Machine Learning Competencies and Curricula for The Rest of Us., , , and . AMIA, AMIA, (2022)The khmer software package: enabling efficient nucleotide sequence analysis., , , , , , , , , and 51 other author(s). F1000Research, (2015)Knowledge sharing, learning engagement and workplace incivility among research scholars: the mediating role of self-esteem., , , , and . J. Knowl. Manag., 28 (4): 897-919 (2024)TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter., , , and . CoRR, (2014)