Author of the publication

A Web Intelligent System based on Measuring the Effects of Bother.

, , and . Web Intelligence, page 715-718. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Cost of Bothering Users in Intelligent Systems., and . IC-AI, page 397-403. CSREA Press, (2007)An efficient certificate revocation validation scheme with k-means clustering for vehicular ad hoc networks., , , and . ISCC, page 862-867. IEEE Computer Society, (2012)A secure group management scheme for mobile ad hoc networks., and . ISCC, page 429-432. IEEE Computer Society, (2010)Coverage-Based Sensor Association Rules for Wireless Vehicular Ad Hoc and Sensor Networks., , and . GLOBECOM, page 352-356. IEEE, (2008)An adaptive computational trust model for mobile ad hoc networks., , and . IWCMC, page 191-195. ACM, (2009)Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness., , and . Q2SWinet, page 33-40. ACM, (2010)A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks., and . PE-WASUN, page 88-95. ACM, (2008)Performance Analysis of Trust-Based Node Evaluation Schemes in Wireless and Mobile Ad Hoc Networks., and . ICC, page 1-5. IEEE, (2009)ARMA: An Efficient Secure Ad Hoc Routing Protocol., and . GLOBECOM, page 1268-1272. IEEE, (2007)A Web Intelligent System based on Measuring the Effects of Bother., , and . Web Intelligence, page 715-718. IEEE Computer Society, (2007)