Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demo: SNEAP: a social network-enabled EAP method no more open hotspots., , , , and . MobiSys, page 351-352. ACM, (2011)Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack., , and . ICDIS, page 9-13. IEEE, (2019)BizMolecules: A Comprehensive HR Solution for Your Business. (2024)Impact of Guidance and Interaction Strategies for LLM Use on Learner Performance and Perception., , , , , , and . CoRR, (2023)Exploring the Use of Large Language Models for Improving the Awareness of Mindfulness., , , , , and . CHI Extended Abstracts, page 129:1-129:7. ACM, (2023)Latency and Reliability Aware SDN Controller: A Role Delegation Function as a Service., , , , and . CCWC, page 205-211. IEEE, (2023)Crop Suggestion using Data Mining Approaches., , , , and . ICCCNT, page 1-5. IEEE, (2021)Effect of Intermediate Network Systems on Remote Power Data Collection in Smart Grid., and . ICDIS, page 49-55. IEEE, (2020)A Plain-Text Incremental Compression (PIC) Technique with Fast Lookup Ability., , , , and . ICCD, page 389-396. IEEE Computer Society, (2018)Using Adaptive Bandit Experiments to Increase and Investigate Engagement in Mental Health., , , , , , , , , and 4 other author(s). AAAI, page 22906-22912. AAAI Press, (2024)