Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering., , , , and . IEEE Trans. Consumer Electronics, 53 (4): 1661-1667 (2007)Toward Sensor-Based Context Aware Systems., , , , , , and . Sensors, 12 (1): 632-649 (2012)Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study., , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies., , and . ICISS, volume 3803 of Lecture Notes in Computer Science, page 21-35. Springer, (2005)Reliability and capability based computation offloading strategy for vehicular ad hoc clouds., , , , , and . J. Cloud Comput., (2019)Rethinking Certification for Trustworthy Machine-Learning-Based Applications., , , and . IEEE Internet Comput., 27 (6): 22-28 (November 2023)A test-based security certification scheme for web services., , , and . ACM Trans. Web, 7 (2): 5:1-5:41 (2013)Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing., , , , , and . Image Vis. Comput., 27 (4): 425-436 (2009)Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method., , , , , and . Inf. Sci., (2017)An assurance process for Big Data trustworthiness., , and . Future Gener. Comput. Syst., (2023)