Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Word Alignment Through Morphological Analysis., , , , , and . IUKM, volume 9376 of Lecture Notes in Computer Science, page 315-325. Springer, (2015)Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks., , and . ISPACS, page 471-475. IEEE, (2013)Interest Rate Volatility and No-Arbitrage Affine Term Structure Models., and . Manag. Sci., 67 (12): 7391-7416 (2021)Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs., , , , , , and . CoRR, (2021)Open Source-Based Over-the-Air 5G New Radio Sidelink Testbed., , , , , , and . MILCOM, page 63-70. IEEE, (2023)5G-EMANE: Scalable Open-Source Real-Time 5G New Radio Network Emulator with EMANE., , , , and . MILCOM, page 553-558. IEEE, (2022)NC-Audit: Auditing for network coding storage., and . NetCod, page 155-160. IEEE, (2012)Predictive Blacklisting as an Implicit Recommendation System., , and . INFOCOM, page 1640-1648. IEEE, (2010)Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies., , , and . Mob. Networks Appl., 17 (3): 415-430 (2012)A multimedia electronic patient record (ePR) system for image-assisted minimally invasive spinal surgery., , , , and . Int. J. Comput. Assist. Radiol. Surg., 5 (3): 195-209 (2010)