Author of the publication

Smart proxying: An optimal strategy for improving battery life of mobile devices.

, , , and . IGCC, page 1-6. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Roman Urdu Opinion Mining System (RUOMiS)., , , and . CoRR, (2015)Risk Assessment and Decision Support for Sustainable Traffic Safety in Hong Kong Waters., , , and . IEEE Access, (2020)A Secure Authentication and Key Management Scheme for Wireless Sensor Networks., and . S-CUBE, volume 143 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 51-60. Springer, (2014)Improving Smartphones Battery Life by Reducing Energy Waste of Background Applications., , , and . NGMAST, page 123-130. IEEE, (2014)QuPiD Attack: Machine Learning-Based Privacy Quantification Mechanism for PIR Protocols in Health-Related Web Search., , , , , and . Sci. Program., (2020)Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid., , , , and . ICS-CSR, BCS, (2016)Saving energy by delegating network activity to home gateways., , , and . IEEE Trans. Consumer Electronics, 61 (4): 445-453 (2015)Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search., , , , , , and . IEEE Access, (2021)Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet., , , , , , and . Comput. Syst. Sci. Eng., 46 (3): 2741-2754 (2023)NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols., , , , and . Complex., (2021)