Author of the publication

Continuous Spatial Authentication.

, , , and . SSTD, volume 5644 of Lecture Notes in Computer Science, page 62-79. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

User Profile-aware Daily Activity Prediction., , , , and . DSP, page 1-5. IEEE, (2023)A light-weighted ANN architecture for the classification of cyber-threats in modern communication networks., , , and . NOF, page 17-24. IEEE, (2019)Continuous Medoid Queries over Moving Objects., , and . SSTD, volume 4605 of Lecture Notes in Computer Science, page 38-56. Springer, (2007)Differentially Private Histograms for Range-Sum Queries: A Modular Approach., , and . CoRR, (2015)A Demonstration of the BigDAWG Polystore System, , , , , , , , , and 8 other author(s). PVLDB, 8 (12): 1908--1911 (2015)An Emerging Role for Polystores in Precision Medicine., , , and . DMAH@VLDB, volume 10494 of Lecture Notes in Computer Science, page 41-52. Springer, (2017)AI-enabled Underground Water Pipe non -destructive Inspection., , , , , and . Multim. Tools Appl., 83 (6): 18309-18332 (February 2024)IoT threat mitigation engine empowered by artificial intelligence multi-objective optimization., , , and . J. Netw. Comput. Appl., (2022)A graph neural network method for distributed anomaly detection in IoT., , , , and . Evol. Syst., 12 (1): 19-36 (2021)Nearest keyword search in XML documents., , , and . SIGMOD Conference, page 589-600. ACM, (2011)