Author of the publication

Cost and performance analysis of server-centric authentication protocol in supply chain management.

, , and . ISSPIT, page 269-274. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparative Studies of Stochastic Techniques to Minimize the Cost of Biomass Supply Networks., , and . RTIP2R (2), volume 2027 of Communications in Computer and Information Science, page 383-392. Springer, (2023)Mantras, Astras & Shastras for ITSM Transformation., , and . Int. CMG Conference, Computer Measurement Group, (2009)A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City., , , , , and . IEEE Access, (2020)Accelerating Deep Learning Inference via Freezing., , , and . CoRR, (2020)Intuitionistic fuzzy ant colony optimization for course sequencing in E-learning., , , and . IC3, page 1-6. IEEE Computer Society, (2016)Analysis of DCNS anti-collision protocol with contiguous channel allocation., and . IC3, page 1-7. IEEE Computer Society, (2016)GTR-CTRL: Instrument and Genre Conditioning for Guitar-Focused Music Generation with Transformers., , , , , and . EvoMUSART@EvoStar, volume 13988 of Lecture Notes in Computer Science, page 260-275. Springer, (2023)DadaGP: A Dataset of Tokenized GuitarPro Songs for Sequence Models., , , , , and . ISMIR, page 610-617. (2021)Wind speed prediction and insight for generalized predictive modeling framework: a comparative study for different artificial intelligence models., , , , , , , , , and . Neural Comput. Appl., 36 (23): 14119-14150 (August 2024)CounterGeDi: A Controllable Approach to Generate Polite, Detoxified and Emotional Counterspeech., , , , and . IJCAI, page 5157-5163. ijcai.org, (2022)