Author of the publication

In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks.

, , , , , and . MobiQuitous, page 326-334. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework., , , , , and . AAAI Spring Symposium: AI Technologies for Homeland Security, page 157-160. AAAI, (2005)Using multi-agent simulation to understand trading dynamics of a derivatives market., , and . Ann. Math. Artif. Intell., 44 (3): 233-253 (2005)Optimal Allocation for Partially Replicated Database Systems on Ring Networks., , and . ICCI, page 470-473. IEEE Computer Society, (1992)On Temporal Modeling in the Context of Object Databases., , and . SIGMOD Record, 22 (3): 8-15 (1993)Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer., , , , , , , and . Int. J. Medical Eng. Informatics, 6 (2): 87-99 (2014)Automatic video summarization for wireless and mobile environments., , and . ICC, page 1532-1536. IEEE, (2004)Fuzzy SVM Ensembles for Relevance Feedback in Image Retrieval., , and . CIVR, volume 4071 of Lecture Notes in Computer Science, page 350-359. Springer, (2006)A Domain Adaptation Technique for Deep Learning in Cybersecurity., , and . OTM Workshops, volume 11878 of Lecture Notes in Computer Science, page 221-228. Springer, (2019)Collaborative joins in a pervasive computing environment., , , and . VLDB J., 14 (2): 182-196 (2005)Electronic Commerce: Tutorial., and . SIGMOD Conference, page 498. ACM Press, (1998)