Author of the publication

A Wireless Sensor Network System - For Monitoring Trees' Health Related Parameters in a University Campus.

, , , , , , and . WINSYS, page 42-47. SciTePress, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Wireless Sensor Network System - For Monitoring Trees' Health Related Parameters in a University Campus., , , , , , and . WINSYS, page 42-47. SciTePress, (2015)Towards De-Anonymization of Google Play Search Rank Fraud., , , and . IEEE Trans. Knowl. Data Eng., 33 (11): 3648-3661 (2021)The Art and Craft of Fraudulent App Promotion in Google Play., , , , and . CCS, page 2437-2454. ACM, (2019)Fraud De-Anonymization for Fun and Profit., , , and . ACM Conference on Computer and Communications Security, page 115-130. ACM, (2018)Stitching giga pixel images using parallel computing., , and . Parallel Processing for Imaging Applications, volume 7872 of SPIE Proceedings, page 78720I. SPIE, (2011)A Wireless Sensor Network System - For Monitoring Trees' Health Related Parameters in a University Campus., , , , , , and . WINSYS, page 42-47. SciTePress, (2015)Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations., , , and . USENIX Security Symposium, page 6683-6700. USENIX Association, (2023)User awareness and defenses against sockpuppet friend invitations in Facebook., , , and . SAC, page 1740-1747. ACM, (2022)Testing Skew and Logic Faults in SoC Interconnects., and . ISVLSI, page 151-156. IEEE Computer Society, (2008)Evaluation of Gunshot Detection Algorithms., , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 58-I (2): 363-373 (2011)