Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent Prediction Based Approach for Mobility Tracking in PCN., , and . International Conference on Internet Computing (1), page 528-534. CSREA Press, (2001)A growing network that optimizes between undertraining and overtraining., , , and . ICNN, page 1116-1120. IEEE, (1995)Neural networks for solving constrained Steiner tree problem., , and . ICNN, page 1867-1870. IEEE, (1995)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 305-316. Springer, (2019)Visitor Access Control Scheme Utilizing Social Relationship in the Real World., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 95-107. Springer, (2010)An Intelligent LOTOS interpreter in AMLOG., , and . ICLP Workshop: Applications of Logic Programming to Software Engineering, (1994)A Computing Model to Bridge a Gap between Real Space and Web Space., , , , and . WEBIST (3), page 107-112. INSTICC Press, (2007)An Overlay Authentication Network for Active Utilization of Private Information., , , , , , and . SAINT, page 185-188. IEEE Computer Society, (2010)uEyes: A Ubiquitous Care-Support Service Based on Multiple Contexts Coordination., , , , , , and . SAINT, page 9. IEEE Computer Society, (2007)Effective Knowledge Sharing based on Symbiotic Computing and its Application to Networked Cooperative Works., , , , and . IEEE ICCI, page 332-341. IEEE Computer Society, (2007)