Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Quality Reconstruction from Multiview Video Streams., , , and . IEEE Signal Process. Mag., 24 (6): 45-57 (2007)FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks., , , , , and . IEEE Access, (2019)Multi-criteria based zone head selection in Internet of Things based wireless sensor networks., , , , , , and . Future Gener. Comput. Syst., (2018)Security Against Compromised Servers: Verifiable DB Queries., , , and . FIT, page 233-238. IEEE, (2019)A survey of Kubernetes scheduling algorithms., , , and . J. Cloud Comput., 12 (1): 87 (December 2023)A taxonomy on misbehaving nodes in delay tolerant networks., , , , , , , and . Comput. Secur., (2018)An adaptive hybrid mutated differential evolution feature selection method for low and high-dimensional medical datasets., , , , , and . Knowl. Based Syst., (January 2024)DSCB: Dual sink approach using clustering in body area network., , , , and . Peer-to-Peer Netw. Appl., 12 (2): 357-370 (2019)An Assessment of Solvers for Algebraically Stabilized Discretizations of Convection-Diffusion-Reaction Equations., , , and . CoRR, (2021)Higher-order discontinuous Galerkin time discretizations the evolutionary Navier-Stokes equations., and . CoRR, (2019)