Author of the publication

Query distribution estimation and predictive caching in mobile ad hoc networks.

, , , and . MobiDE, page 24-30. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations., , , and . CoRR, (2022)Improving binary classification on text problems using differential word features., , , and . CIKM, page 2019-2024. ACM, (2009)ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems., , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1673-1686 (2022)Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether., , and . Clust. Comput., 4 (4): 343-354 (2001)Finding and Ranking Knowledge on the Semantic Web., , , , , and . ISWC, volume 3729 of Lecture Notes in Computer Science, page 156-170. Springer, (2005)Semantic Message Passing for Generating Linked Data from Tables., , and . ISWC (1), volume 8218 of Lecture Notes in Computer Science, page 363-378. Springer, (2013)NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion., , and . BigDataSecurity/HPSC/IDS, page 49-54. IEEE, (2020)PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data., , , and . IWSPA@CODASPY, page 35-45. ACM, (2022)A Policy Based Approach to Security for the Semantic Web., , and . ISWC, volume 2870 of Lecture Notes in Computer Science, page 402-418. Springer, (2003)Using Linked Data to Interpret Tables., , , and . COLD, volume 665 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)