Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Calculation of Reputation in P2P Networks., , , and . J. Networks, 4 (5): 332-342 (2009)Credibility Based Reputation Calculation in P2P Networks., , , and . ICDCIT, volume 5375 of Lecture Notes in Computer Science, page 188-195. Springer, (2008)Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts., , , , and . IIH-MSP, page 550-553. IEEE Computer Society, (2007)Medical Image Denoising using Adaptive Threshold Based on Contourlet Transform, and . CoRR, (2011)Noise suppression using Wiener filtering in the nonsubsampled contourlet domain for Magnetic Resonance brain images., , and . IHCI, page 1-4. IEEE, (2012)Real-Time Software Implementation of H.264 Baseline Profile Video Encoder for Mobile and Handheld Devices., , , and . ICASSP (5), page 457-460. IEEE, (2006)Efficient implementation of MPEG-4 video encoder on RISC core., and . IEEE Trans. Consumer Electronics, 49 (1): 204-209 (2003)Adaptive Optimization-Enabled Neural Networks to Handle the Imbalance Churn Data in Churn Prediction., , and . Int. J. Comput. Intell. Appl., 20 (4): 2150025:1-2150025:25 (2021)Churn prediction using optimized deep learning classifier on huge telecom data., , and . J. Ambient Intell. Humaniz. Comput., 14 (3): 2007-2028 (March 2023)Cooperative Memory Structures and Commonsense Knowledge for Planning., and . EPIA, volume 1323 of Lecture Notes in Computer Science, page 319-324. Springer, (1997)