Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A response generation mechanism for an intelligent active assistance system., , and . ACM Conference on Computer Science, page 128-132. ACM, (1987)Secure Multicast in WiMAX., , and . J. Networks, 3 (2): 48-57 (2008)Longest paths and cycles in K1, 3-free graphs., and . J. Graph Theory, 9 (2): 269-277 (1985)Logics for artificial intelligence: Raymond Turner, Ellis Horwood Ltd., West Sussex, England, First Printing 1984, Second Printing 1985.. Int. J. Approx. Reason., 2 (1): 89-90 (1988)A New Approach to Managing the Evolution of OWL Ontologies., and . SWWS, page 57-63. CSREA Press, (2008)A Graphical Password Scheme Strongly Resistant to Spyware., , , and . Security and Management, page 94-100. CSREA Press, (2004)A Dual Authentication Protocol for IEEE 802.11 Wireless LANs., , , , and . ISWCS, page 565-569. IEEE, (2005)A Web Interface for Nessus Network Security Scanner., and . International Conference on Internet Computing, page 383-389. CSREA Press, (2004)Parallel Parsing of Ambigous Languages on Hypercube Architectures., and . IEA/AIE, volume 604 of Lecture Notes in Computer Science, page 539-545. Springer, (1992)USCSH: An Active Intelligent Assistance System., , , and . Artif. Intell. Rev., 14 (1-2): 121-141 (2000)