Author of the publication

A proxy-based uncoordinated checkpointing scheme with pessimistic message logging for mobile grid systems.

, , , and . HPDC, page 237-238. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-supervised nearest neighbor editing., , , and . IJCNN, page 1183-1187. IEEE, (2008)Mapping of Activity Recognition as a Distributed Inference Problem in Sensor Network., , , and . IC-AI, page 280-285. CSREA Press, (2008)Combining Multi-layer Perceptron and K-Means for Data Clustering with Background Knowledge., , , , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 1220-1226. Springer, (2007)More reputable recommenders give more accurate recommendations?, , , , and . ICUIMC, page 24. ACM, (2013)Visualizations of human activities in sensor-enabled ubiquitous environments., , , and . ICUMT, page 1-6. IEEE, (2009)Using Sensor Sequences for Activity Recognition by Mining and Multi-Class Adaboost., , and . IC-AI, page 735-740. CSREA Press, (2010)A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks., , , , and . ICON, page 188-193. IEEE, (2007)Preference learning on an OSGi based home gateway., , , and . IEEE Trans. Consumer Electronics, 55 (3): 1322-1329 (2009)Finding Reliable Recommendations for Trust Model., , , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 375-386. Springer, (2006)Iss2Image: A Novel Signal-Encoding Technique for CNN-Based Human Activity Recognition., , , , , and . Sensors, 18 (11): 3910 (2018)