Author of the publication

A Trust-Based Usage Control Scheme for Resource Sharing.

, , , and . UIC/ATC/ScalCom, page 550-556. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved LLM methods using linear regression., , , and . IGARSS, page 5350-5353. IEEE, (2017)Joint merging overlapped virtual cells and designing beamforming in ultra dense network., , , and . ISWCS, page 170-174. IEEE, (2017)Generalized Beta Distribution of the Second Kind for Flood Frequency Analysis., and . Entropy, 19 (6): 254 (2017)A Critical Assessment of Combined Ligand- and Structure-Based Approaches to hERG Channel Blocker Modeling., , and . Journal of Chemical Information and Modeling, 51 (11): 2948-2960 (2011)The reconstruction of an hermitian toeplitz matrix with prescribed eigenpairs., , and . J. Systems Science & Complexity, 23 (5): 961-970 (2010)A Review on Hybridization of Particle Swarm Optimization with Artificial Bee Colony., , , , and . ICSI (2), volume 10386 of Lecture Notes in Computer Science, page 242-249. Springer, (2017)Browse with a social web directory., , , , , and . SIGIR, page 865-868. ACM, (2013)Finding Frequent Closed Itemsets in Sliding Window in Linear Time., , , , and . IEICE Trans. Inf. Syst., 91-D (10): 2406-2418 (2008)Optimized Foothold Planning and Posture Searching for Energy-Efficient Quadruped Locomotion over Challenging Terrains., , , , , and . ICRA, page 399-405. IEEE, (2020)Attacking Optical Character Recognition (OCR) Systems with Adversarial Watermarks., and . CoRR, (2020)