From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Performance Evaluation of Machine Learning Approaches in Detecting IoT-Botnet Attacks., , , , , и . Int. J. Interact. Mob. Technol., 17 (19): 136-146 (октября 2023)A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment., , , , и . Int. J. Bus. Inf. Syst., 28 (4): 393-403 (2018)Spherical-based routing protocols for three-dimensional MANET., , , , и . Int. J. Comput. Sci. Math., 16 (2): 125-135 (2022)Machine Learning Based Phishing Attacks Detection Using Multiple Datasets., , , и . Int. J. Interact. Mob. Technol., 17 (5): 71-83 (марта 2023)Performance and energy impact of OpenMP runtime configurations on power constrained systems., , , и . Sustain. Comput. Informatics Syst., (2019)Adaptive OpenMP Task Scheduling Using Runtime APIs and Machine Learning., , и . ICMLA, стр. 889-895. IEEE, (2015)A Compiler-Based Tool for Array Analysis in HPC Applications., , и . ICPP Workshops, стр. 454-463. IEEE Computer Society, (2012)Power and energy footprint of openMP programs using OpenMP runtime API., , , и . E2SC@SC, стр. 79-88. IEEE Computer Society, (2014)A detailed analysis of OpenMP runtime configurations for power constrained systems., , , и . IGSC, стр. 1-8. IEEE Computer Society, (2017)Open Source Task Profiling by Extending the OpenMP Runtime API., , , , и . IWOMP, том 8122 из Lecture Notes in Computer Science, стр. 186-199. Springer, (2013)