Author of the publication

Mining Collective Opinions for Comparison of Mobile Apps.

, and . FNC/MobiSPC, volume 94 of Procedia Computer Science, page 168-175. Elsevier, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-Based Routing for Wireless Sensor Network., , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 68-79. Springer, (2007)Towards augmenting ambient systems networks and technologies., , and . J. Ambient Intell. Humaniz. Comput., 10 (7): 2493-2494 (2019)Special issue on ubiquitous computing in the IoT revolution., , and . J. Ambient Intell. Humaniz. Comput., 11 (6): 2203-2204 (2020)STIMF: a smart traffic incident management framework., , , , , and . J. Ambient Intell. Humaniz. Comput., 12 (1): 85-101 (2021)Special issue on ubiquitous computing and NextGen context-fusion., , and . J. Ambient Intell. Humaniz. Comput., 10 (12): 4625-4627 (2019)Automated Analysis of Load Tests Using Performance Counter Logs.. Queen's University at Kingston, Ontario, Canada, (2013)Special issue on advances in ambient intelligence and pervasive computing., , and . J. Ambient Intell. Humaniz. Comput., 11 (10): 3893-3894 (2020)What Do Developers Reply To? An Empirical Study of the Top Unmanned Aerial Vehicles (UAVs) Apps (S)., , and . SEKE, page 261-264. KSI Research Inc., (2021)Classification of Post-deployment Performance Diagnostic Techniques for Large-scale Software Systems., and . EUSPN/ICTH, volume 37 of Procedia Computer Science, page 244-251. Elsevier, (2014)Digital Canaries: Identifying Hazardous Patterns in Msha Data Using A Machine Learner., , and . EUSPN/ICTH, volume 177 of Procedia Computer Science, page 227-233. Elsevier, (2020)