Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The `repricing' of executive stock options, , and . Journal of Financial Economics, 57 (1): 129--154 (July 2000)Securing Bioinformatics Cloud for Big Data: Budding Buzzword or a Glance of the Future., , and . Recent Advances in Computational Intelligence, volume 823 of Studies in Computational Intelligence, Springer, (2019)Direct laser writing of volumetric gradient index lenses and waveguides, , , , , , , , , and 10 other author(s). Light: Science & Applications, 9 (1): 196-- (2020)Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers., , and . Wireless Personal Communications, 80 (3): 1281-1345 (2015)The database of the PREDICTS (Projecting Responses of Ecological Diversity In Changing Terrestrial Systems) project, , , , , , , , , and 505 other author(s). Ecology and Evolution, 7 (1): 145--188 (January 2017)DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication., and . Int. J. Image Graph., 23 (4): 2350035:1-2350035:22 (July 2023)Review on Current Trends of Deep Learning., , and . Recent Advances in Computational Intelligence, volume 823 of Studies in Computational Intelligence, Springer, (2019)Finite element analysis megatrends: A road less traveled., , and . Comput. Appl. Eng. Educ., (May 2024)Effect of Randomization for Privacy Preservation on Classification Tasks., and . ICIA, page 41:1-41:5. ACM, (2016)Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack, , and . CoRR, (2009)