Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 214-225. Springer, (2003)ETAS: Energy and thermal-aware dynamic virtual machine consolidation in cloud data center with proactive hotspot mitigation., , and . Concurr. Comput. Pract. Exp., (2019)A backtracking algorithm for the stream AND-parallel execution of logic programs., , and . Int. J. Parallel Program., 17 (3): 207-257 (1988)Contrast Pattern Mining and Its Application for Building Robust Classifiers.. Discovery Science, volume 6332 of Lecture Notes in Computer Science, page 380. Springer, (2010)Instance-Based Ensemble Selection Using Deep Reinforcement Learning., and . IJCNN, page 1-7. IEEE, (2020)An Implementation Overview of the Aditi Deductive Database System.. DOOD, volume 760 of Lecture Notes in Computer Science, page 184-203. Springer, (1993)Preserving Privacy in the Internet of Connected Vehicles., , , , and . IEEE Trans. Intell. Transp. Syst., 22 (8): 5018-5027 (2021)A robust and reliable quantification method for Focal Arteriolar Narrowing in color retinal image., , , , and . ISBI, page 1510-1513. IEEE, (2015)Streaming route assignment with prior temporal traffic data., , , and . IWCTS@SIGSPATIAL, page 7:1-7:10. ACM, (2020)Role engineering using graph optimisation., , and . SACMAT, page 139-144. ACM, (2007)