Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test Suite Optimization Using Chaotic Firefly Algorithm in Software Testing., and . Int. J. Appl. Metaheuristic Comput., 8 (4): 41-57 (2017)Exploring social network privacy measurement using fuzzy vector commitment., and . Intell. Decis. Technol., 10 (3): 285-297 (2016)An Immune System Inspired Approach to Automated Program Verification. CoRR, (2009)Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis., , , and . AST/UCMA/ISA/ACN, volume 6059 of Lecture Notes in Computer Science, page 491-498. Springer, (2010)Decentralized self-balancing systems., , , and . VLSI-SoC, page 340-343. IEEE, (2013)Erratum: "Hybrid Group Recommendation Using Modified Termite Colony Algorithm: A Context Towards Big Data"., , , , and . J. Inf. Knowl. Manag., 18 (3): 1992001:1 (2019)On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations Based Wireless Sensor Networks., , , , and . ICMC, volume 1170 of Advances in Intelligent Systems and Computing, page 1-17. Springer, (2019)Improving Online Rent-or-Buy Algorithms with Sequential Decision Making and ML Predictions.. NeurIPS, (2020)On the conditions of guaranteed k-fault tolerant systems supporting on-the-fly repairs., and . ICCD, page 387-390. IEEE Computer Society, (2015)A general approach for highly defect tolerant Parallel Prefix Adder design., and . DATE, page 666-671. IEEE, (2016)