Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Reputation Systems. Queensland University of Technology, Information Security Research Centre, (November 2004)Private Reputation Schemes for P2P systems., , , and . WOSIS, page 196-206. INSTICC Press, (2004)An Efficient Off-Line Reputation Scheme Using Articulated Certificates., , , and . WOSIS, page 53-62. INSTICC Press, (2004)Discovering community structure in Complex Network through Community Detection Approach., and . IMCOM, page 42:1-42:4. ACM, (2018)Using data mining techniques for predicting individual tree mortality in tropical rain forest: logistic regression and decision trees approach., , , and . ICUIMC, page 91:1-91:5. ACM, (2014)Email Ontology Learning System Based on Fuzzy Logic., , and . IJWA, 5 (1): 37-45 (2013)Computer simulation of tree mapping approach to project the future growth of forest., and . IMCOM, page 54. ACM, (2017)Similarity Search Techniques in Exploratory Search: A Review., , and . TENCON, page 2193-2198. IEEE, (2018)Solution for Information Overload Using Faceted Search-A Review., , , , and . IEEE Access, (2020)Group based access control scheme: proof of method for secure access control architecture in mobile ad-hoc networks., , , , and . MoMM, page 446-451. ACM, (2009)