Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big Data Analytics over Encrypted Datasets with Seabed., , , , , , , and . OSDI, page 587-602. USENIX Association, (2016)Minimal Tail-Biting Trellises for Certain Cyclic Block Codes Are Easy to Construct., , , and . ICALP, volume 2076 of Lecture Notes in Computer Science, page 627-638. Springer, (2001)Online Prediction of Robot to Human Handover Events Using Vibrations., , , , , and . EUSIPCO, page 687-691. IEEE, (2018)Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent., , and . Wirel. Networks, 26 (8): 5965-5979 (2020)Cognitive Cyber Security Assistants - Computationally Deriving Cyber Intelligence and Course of Actions., , , , and . AAAI Fall Symposia, AAAI Press, (2016)Multiple-View Spectral Clustering for Group-wise Functional Community Detection., , , , , , , , and . CoRR, (2016)A Case Study on Quality Attribute Measurement using MARF and GIPSY., , , , , , and . CoRR, (2015)Improving Clustering Techniques in Wireless Sensor Networks Using Thinning Process., , , and . PERFORM, volume 6821 of Lecture Notes in Computer Science, page 203-214. Springer, (2010)Optimization of sustain pulse parameters for luminous efficacy improvement in an AC plasma display panel., , , , and . Displays, 31 (3): 122-127 (2010)Empirical Study of Agile Software Development Methodologies: A Comparative Analysis., , , and . ACM SIGSOFT Softw. Eng. Notes, 40 (1): 1-6 (2015)