Author of the publication

Security Concerns at Various Levels of Cloud Computing Paradigm: A Review

, and . International Journal of Computer Networks and Applications (IJCNA), 2 (2): 41-45 (April 2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subspace detection of high-dimensional vectors using compressive sampling., and . SSP, page 724-727. IEEE, (2012)Detecting Activations over Graphs using Spanning Tree Wavelet Bases, , and . CoRR, (2012)Signal Recovery on Graphs: Fundamental Limits of Sampling Strategies., , , and . CoRR, (2015)Detecting Activations over Graphs using Spanning Tree Wavelet Bases., , and . AISTATS, volume 31 of JMLR Workshop and Conference Proceedings, page 536-544. JMLR.org, (2013)Computationally Efficient Robust Sparse Estimation in High Dimensions., , , and . COLT, volume 65 of Proceedings of Machine Learning Research, page 169-212. PMLR, (2017)Design of an Intelligent and Adaptive Mapping Mechanism for Multiagent Interface., , and . HPAGC, volume 169 of Communications in Computer and Information Science, page 373-384. Springer, (2011)An Improved Design of Contract Net Trust Establishment Protocol, and . ACEEE International Journal of Communications, 4 (1): 7 (July 2013)Active learning for adaptive mobile sensing networks., , and . IPSN, page 60-68. ACM, (2006)Local White Matter Architecture Defines Functional Brain Dynamics., , , , and . SMC, page 595-602. IEEE, (2018)Signal detection on graphs: Bernoulli noise model., , , and . GlobalSIP, page 395-399. IEEE, (2016)