Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Big Data for Firm Performance: a Configurational Approach., , , and . AMCIS, Association for Information Systems, (2015)Local polynomial contrast binary patterns for face recognition., , , , , and . Neurocomputing, (2019)In Sharing Economy We Trust: Examining the Effect of Social and Technical Enablers on Millennials' Trust in Sharing Commerce., , , and . Comput. Hum. Behav., (2020)A rational framework for secure communication., , , , and . Inf. Sci., (2013)RSU authentication in vehicular ad hoc networks base on verifiable secret sharing., , , , and . J. Intell. Fuzzy Syst., 37 (4): 4531-4536 (2019)Scheduling Bursts Using Interval Graphs in Optical Burst Switching Networks., , and . GLOBECOM, page 1-6. IEEE, (2009)Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement., , , and . IEEE Trans. Learn. Technol., 10 (4): 514-525 (2017)Big Data Analytics for New Product Success (Product Innovation)., , and . AMCIS, Association for Information Systems, (2018)FedBoosting: Federated learning with gradient protected boosting for text recognition., , , , and . Neurocomputing, (February 2024)Adversarial Attack Against Urban Scene Segmentation for Autonomous Vehicles., , , , , and . IEEE Trans. Ind. Informatics, 17 (6): 4117-4126 (2021)