Author of the publication

Estimating Twitter User Location Using Social Interactions-A Content Based Approach.

, , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MapIt: a case study for location driven knowledge discovery and mining., , and . Int. J. Data Min. Model. Manag., 5 (1): 57-75 (2013)Estimating Twitter User Location Using Social Interactions-A Content Based Approach., , and . SocialCom/PASSAT, page 838-843. IEEE Computer Society, (2011)Cryptanalysis of Ä Robust Smart-Card-Based Remote User Password Authentication Scheme"., , , and . ISBAST, page 247-250. IEEE, (2013)Chaotic and AES cryptosystem for satellite imagery.. Telecommun. Syst., 52 (2): 573-581 (2013)Subjectivity classification and analysis of the ASRS corpus., , and . IRI, page 160-165. IEEE Systems, Man, and Cybernetics Society, (2011)Cryptanalysis of Truong et al.'s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device., , , and . BICS, volume 7888 of Lecture Notes in Computer Science, page 271-277. Springer, (2013)Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption., , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 1014-1024. Springer, (2009)Framework for Secure Wireless Communication in Wireless Sensor Networks., and . IJDSN, (2013)Discovering the Botnet Detection Techniques., and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 231-235. Springer, (2010)Secure multimedia communication in wireless mesh networks., , and . ICITST, page 1-4. IEEE, (2010)