Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ISURE: User authentication in mobile devices using ocular biometrics in visible spectrum., , , , and . ICIP, page 335-339. IEEE, (2016)Causal Modeling based Fault Localization in Cloud Systems using Golden Signals., , , , , , , and . CLOUD, page 124-135. IEEE, (2021)Domain specific ontologies from Linked Open Data (LOD)., , , , and . COMAD/CODS, page 105-109. ACM, (2022)Analysing the Spread of Toxicity on Twitter., , and . COMAD/CODS, page 118-126. ACM, (2024)Leveraging Cognitive Features for Sentiment Analysis., , , , and . CoNLL, page 156-166. ACL, (2016)Decoding Logs for Automatic Metric Identification., , , , , , and . CLOUD, page 336-343. IEEE, (2024)Building Golden Signal Based Signatures for Log Anomaly Detection., , , and . CLOUD, page 203-208. IEEE, (2022)Forecasting the Spread of Toxicity on Twitter., , and . CogMI, page 209-217. IEEE, (2023)Like-Minded Communities: Bringing the Familiarity and Similarity together., , , , , and . WISE, volume 7651 of Lecture Notes in Computer Science, page 382-395. Springer, (2012)Eye center localization and detection using radial mapping., , , , and . ICIP, page 3121-3125. IEEE, (2016)