Author of the publication

Can you always reap what you sow? Network and functional data analysis of VC investments in health-tech companies.

, , , , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to Special Issue on Misinformation, Fake News and Rumor Detection in Low-Resource Languages., , and . ACM Trans. Asian Low Resour. Lang. Inf. Process., 21 (1): 1e:1-1e:3 (2022)Cloud Manufacturing: Security, Privacy, and Forensic Concerns., , , and . IEEE Cloud Comput., 3 (4): 16-22 (2016)Live Migration in Emerging Cloud Paradigms., , , and . IEEE Cloud Comput., 3 (2): 12-19 (2016)Evidence and Forensics in the Cloud: Challenges and Future Research Directions., , and . IEEE Cloud Comput., 4 (3): 14-19 (2017)A federated interoperability architecture for health information systems., , , , and . Int. J. Internet Protoc. Technol., 7 (4): 189-202 (2013)Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms., , , , and . IEEE Access, (2019)Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence., , , , and . IEEE Internet Things J., 5 (3): 1679-1689 (2018)CNN-based anti-spoofing two-tier multi-factor authentication system., , , , , , , and . Pattern Recognit. Lett., (2019)An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications., , , , , and . IEEE Trans. Ind. Informatics, 15 (7): 4266-4275 (2019)Trustworthiness Assessment of Users in Social Reviewing Systems., , and . IEEE Trans. Syst. Man Cybern. Syst., 52 (1): 151-165 (2022)