Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

K-Means on Commodity GPUs with CUDA., , , , and . CSIE (3), page 651-655. IEEE Computer Society, (2009)A Low Power Balanced Security Control Protocol of WSN., , , , and . QSHINE, volume 199 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 46-51. Springer, (2016)High-resolution temperature and salinity model analysis using support vector regression., , , , , and . J. Ambient Intell. Humaniz. Comput., 15 (2): 1517-1525 (February 2024)A Parallel Adaptive Circumference Method with OpenMP., , , and . CSA/CUTE, volume 474 of Lecture Notes in Electrical Engineering, page 748-755. Springer, (2017)Public-Key Encryption with Keyword Search from Lattice., , , and . 3PGCIC, page 336-339. IEEE, (2013)Access Control Model Based on Trust and Risk Evaluation in IDMaaS., , , and . ITNG, page 179-184. IEEE Computer Society, (2015)ICHAMELEON: An Incremental CHAMELEON Algorithm., , , , and . Computational Intelligence, page 104-107. IASTED/ACTA Press, (2005)Dynamic Integration Strategy for Mediation Framework., , , and . SEKE, page 520-524. (2005)Public-key searchable encryption from lattices., , , and . Int. J. High Perform. Syst. Archit., 5 (1): 25-32 (2014)Simulation of Evacuating Crowd Based on Deep Learning and Social Force Model., , , , , and . IEEE Access, (2019)