Author of the publication

A study of requirement definition in user-oriented virtual network architecture.

, , , , , and . ICIS, page 4-9. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era., , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 737-749. Springer, (2017)Service and Billing Management Method for ICT Services., and . Int. J. Softw. Innov., 4 (2): 1-16 (2016)Risk assessment of BYOD: Bring your own device., , , , , and . GCCE, page 1-4. IEEE, (2016)Improving Matching Process with Expanding and Classifying Criterial Keywords leveraging Word Embedding and Hierarchical Clustering Methods., , and . Rev. Socionetwork Strateg., 14 (2): 193-204 (2020)Econometric Approach for Broadband Market in Japan., , , , , and . KES (3), volume 6278 of Lecture Notes in Computer Science, page 225-234. Springer, (2010)Using SNS for loan review at the bank., and . IIAI-AAI, page 555-560. IEEE, (2022)Properly initialized Bayesian Network for decision making leveraging random forest., , and . Artif. Intell. Res., 9 (1): 36- (2020)Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service., , , , , and . IIAI-AAI, page 1126-1131. IEEE Computer Society, (2016)Mobile Internet-Access Behavior Analysis., , , , , and . SNPD, page 766-770. IEEE Computer Society, (2012)An improvement of micro area selection technique for the diffusion of ICT infrastructure., , , and . SNPD, page 1-6. IEEE Computer Society, (2014)