Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tensor-Based Forensics Framework for Virtualized Network Functions in the Internet of Things: Utilizing Tensor Algebra in Facilitating More Efficient Network Forensic Investigations., , , , , and . IEEE Consumer Electronics Magazine, 8 (3): 23-27 (2019)Grid and Workflows., and . Encyclopedia of Database Systems, Springer US, (2009)A Probabilistic Strategy for Setting Temporal Constraints in Scientific Workflows., , and . BPM, volume 5240 of Lecture Notes in Computer Science, page 180-195. Springer, (2008)A Coupling Approach With GSO-BFOA for Many-Objective Optimization., , , , , , and . IEEE Access, (2019)Integrating Collaborative Filtering and Association Rule Mining for Market Basket Recommendation., , , and . WISE (2), volume 11234 of Lecture Notes in Computer Science, page 19-34. Springer, (2018)Cloud-Assisted Key Distribution in Batch for Secure Real-Time Mobile Services., , , and . IEEE Trans. Serv. Comput., 11 (5): 850-863 (2018)A Space-Filling Multidimensional Visualization (SFMDVis) for Exploratory Data Analysis., , , , , and . Inf. Sci., (2017)EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment., , , and . IEEE Trans. Cloud Comput., 4 (2): 166-179 (2016)A Knowledge Graph-Based Many-Objective Model for Explainable Social Recommendation., , , , and . IEEE Trans. Comput. Soc. Syst., 10 (6): 3021-3030 (December 2023)MODSC: Many-Objective-Optimization-Driven Data-Balancing Strategy in Cross-Architectural Malware Classification for Extreme IoT., , , , and . IEEE Internet Things J., 11 (3): 3702-3710 (February 2024)