Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent Network Intrusion Detection System Based on Multi-Modal Support Vector Machines.. Int. J. Inf. Secur. Priv., 7 (4): 37-52 (2013)Analysis of projects and volunteer participation in large scale free and open source software ecosystem., and . ACM SIGSOFT Softw. Eng. Notes, 36 (2): 1-5 (2011)An Efficient Fuzzy based Neuro - Genetic Algorithm for Stock Market Prediction., , and . IICAI, page 2256-2274. IICAI, (2005)Selective Dissemination of XML Documents Using GAs and SVM., , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 562-567. Springer, (2005)Game theoretic resource allocation in cloud computing., , , , , and . ICADIWT, page 36-42. IEEE, (2014)Fault-Tolerant Middleware for Grid Computing., , and . HPCC, page 635-640. IEEE, (2010)SLA - Driven Dynamic Resource Allocation on Clouds., and . ADCONS, volume 7135 of Lecture Notes in Computer Science, page 9-18. Springer, (2011)Content-Based Music Classification Using Ensemble of Classifiers., , , , , and . IHCI, volume 11278 of Lecture Notes in Computer Science, page 285-292. Springer, (2018)Indexing XML Documents Using Self Adaptive Genetic Algorithms for Better Retreival., , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 640-651. Springer, (2006)Project Based Learning for Internet of Things and Data Analytics: Experience Report of Learning from ET601X., and . T4E, page 262-263. IEEE Computer Society, (2016)