Author of the publication

SuperTrust - A Secure and Efficient Framework for Handling Trust in Super Peer Networks.

, , and . ICDCN, volume 4904 of Lecture Notes in Computer Science, page 350-362. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Domain Knowledge and Representation in Genetic Algorithms for Real World Scheduling Problems., and . GECCO, page 690-696. Morgan Kaufmann, (2000)Implementing a Commercial-Strength Parallel Hybrid Movie Recommendation Engine., , and . IEEE Intelligent Systems, 29 (2): 92-96 (2014)AMORE: design and implementation of a commercial-strength parallel hybrid movie recommendation engine., , and . Knowl. Inf. Syst., 47 (3): 671-696 (2016)Experiences with G2G: a location-aware mobile social networking system., , and . Int. J. Pervasive Comput. Commun., 7 (2): 98-113 (2011)Minimum-perimeter domain assignment., , and . Math. Program., (1997)A heuristic hierarchical scheme for academic search and retrieval., , , and . Inf. Process. Manag., 49 (6): 1326-1343 (2013)Optimal (r, nQ, T) batch-ordering policy under stationary demand., , and . Int. J. Syst. Sci., 43 (9): 1774-1784 (2012)Detecting fraud in online games of chance and lotteries., , , , , and . Expert Syst. Appl., 38 (10): 13158-13169 (2011)Three-layer Approach to Detect Anomalies in Industrial Environments based on Machine Learning., , , , , , , , , and 1 other author(s). ICPS, page 250-256. IEEE, (2020)A Robust and Explainable Data-Driven Anomaly Detection Approach For Power Electronics., , , , , , and . SmartGridComm, page 296-301. IEEE, (2022)