Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RAPID: Reputation based approach for improving intrusion detection effectiveness.. IAS, page 118-124. IEEE, (2010)Performance Adaptation in Real-Time Intrusion Detection Systems., , , , , and . RAID, volume 2516 of Lecture Notes in Computer Science, page 252-273. Springer, (2002)Global potential for harvesting drinking water from air using solar energy., , , , , , , , , and 4 other author(s). Nat., 598 (7882): 611-617 (2021)Collaborative Approach to Translating Online Learning Content: Research Data Management Librarian Academy ( RDMLA ) and National Taiwan University ( NTU ) Library Translation and Co-Creation Partnership., , and . ASIST, volume 58 of Proc. Assoc. Inf. Sci. Technol., page 845-846. Wiley, (2021)Multimodal Densenet., , , and . CoRR, (2018)Estimating ensemble weights for bagging regressors based on the mean-variance portfolio framework., , and . Expert Syst. Appl., 229 (Part A): 120462 (November 2023)Interaction with meaningful state : implementing dependency on digital computers.. University of Warwick, Coventry, UK, (2004)British Library, EThOS.Digital Fixed-Point Low Powered Area Efficient Function Estimation for Implantable Devices., , and . IEEE Access, (2022)Preferring the Mighty to the Meek: Toddlers prefer Superior to Subordinate Individuals., , , , and . CogSci, cognitivesciencesociety.org, (2016)Infants use imitation but not comforting or social synchrony to evaluate those in social interactions., , and . CogSci, cognitivesciencesociety.org, (2020)