From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Validation Using Linear Bounded Automata in Web Service Environment., , и . ICIA, стр. 52:1-52:9. ACM, (2016)Internet of medical things and cloud enabled brain tumour diagnosis model using deep learning with kernel extreme learning machine., , , и . Int. J. Electron. Heal., 12 (3): 203-220 (2022)AOSE Methodologies and Comparison of Object Oriented and Agent Oriented Software Testing., , , и . ICIA, стр. 119:1-119:16. ACM, (2016)Computability evaluation of RESTful API using Primitive Recursive Function., , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (2): 457-467 (2022)Incremental Hierarchical Clustering driven Automatic Annotations for Unifying IoT Streaming Data., , , и . Int. J. Interact. Multim. Artif. Intell., 6 (2): 1-15 (2020)Business workflow growth rate analysis using cellular automata., , и . CCSEIT, стр. 315-321. ACM, (2012)A greedy approach with criteria factors for QoS based web service discovery., , , и . Bangalore Compute Conf., стр. 12. ACM, (2009)Internet of medical things with cloud-based e-health services for brain tumour detection model using deep convolution neural network., , и . Electron. Gov. an Int. J., 16 (1/2): 69-83 (2020)BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES, , , и . International Journal on Web Service Computing (IJWSC), 1 (2): 15-29 (декабря 2010)A collaborative framework for evaluation of run-time changes in enterprise web services., , и . CUBE, стр. 413-418. ACM, (2012)