Author of the publication

A Comprehensive Context Modeling Framework for Pervasive Computing Systems

, , , , , , , , and . Distributed Applications and Interoperable Systems: 8th IFIP WG 6.1 International Conference, DAIS 2008, Oslo, Norway, (2008)
DOI: 10.1007/978-3-540-68642-2_23

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computational theory of short distance reflexive anaphoric devices in Urdu discourse for effective machine translation., , and . FIT, page 19:1-19:6. ACM, (2009)Multi-View Clustering Based on Multiple Manifold Regularized Non-Negative Sparse Matrix Factorization., , , , , , , , and . IEEE Access, (2022)An Optimal Order of Factors for the Computational Treatment of Personal Anaphoric Devices in Urdu Discourse., , and . IJCNLP, page 81-90. The Association for Computer Linguistics, (2008)A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data., , , and . IEEE Access, (2020)A service-categorized security scheme with physical unclonable functions for internet of vehicles., , , , and . J. Big Data, 10 (1): 178 (December 2023)Ordered semigroups characterized in terms of generalized fuzzy ideals., , and . J. Intell. Fuzzy Syst., 32 (1): 1045-1057 (2017)A Comprehensive Context Modeling Framework for Pervasive Computing Systems, , , , , , , , and . Distributed Applications and Interoperable Systems: 8th IFIP WG 6.1 International Conference, DAIS 2008, Oslo, Norway, (2008)Project-based learning continues to inspire cybersecurity students: the 2018-2019 SFS research studies at UMBC., , , , , , , , , and 26 other author(s). Inroads, 11 (2): 46-54 (2020)Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms., , , , , and . WPMC, page 76-82. IEEE, (2023)A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast., , and . CCWC, page 933-938. IEEE, (2023)