Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cellular Automata Based Authentication (CAA)., , and . ACRI, volume 2493 of Lecture Notes in Computer Science, page 259-269. Springer, (2002)Evolving Cellular Automata as Pattern Classifier., , , , and . ACRI, volume 2493 of Lecture Notes in Computer Science, page 56-68. Springer, (2002)Design of a Robust Search Algorithm for P2P Networks., , and . HiPC, volume 3296 of Lecture Notes in Computer Science, page 222-231. Springer, (2004)Effect of Dynamicity on Peer to Peer Networks., , and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 452-463. Springer, (2007)Functions of Code-Switching in Tweets: An Annotation Framework and Some Initial Experiments., , , , and . LREC, European Language Resources Association (ELRA), (2016)On Fair Virtual Conference Scheduling: Achieving Equitable Participant and Speaker Satisfaction., , , and . CoRR, (2020)Analyzing the vulnerability of superpeer networks against attack., , , and . ACM Conference on Computer and Communications Security, page 225-234. ACM, (2007)Toward Fair Recommendation in Two-sided Platforms, , , , and . ACM Transactions on the Web (TWEB), 16 (2): 1--34 (2021)EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks., , , , , , , and . Networking, page 127-135. IEEE, (2020)A Large-Scale Study of the Twitter Follower Network to Characterize the Spread of Prescription Drug Abuse Tweets., , , , and . IEEE Trans. Comput. Soc. Syst., 6 (6): 1232-1244 (2019)