Author of the publication

Multidimensional Sensor Data Analysis in Cyber-Physical System: An Atypical Cube Approach.

, , , , , , , and . Int. J. Distributed Sens. Networks, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Caching for Non-independent Content: Improving Information Gathering in Constrained Networks., , , , , , , and . MILCOM, page 1720-1725. IEEE, (2013)Detecting Betrayers in Online Environments Using Active Indicators., , , , and . SBP-BRiMS, volume 10899 of Lecture Notes in Computer Science, page 16-27. Springer, (2018)Simulating scenarios for research on culture & cognition using a commercial role-play game., , , , and . WSC, page 1109-1117. IEEE Computer Society, (2005)Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system., , , , , and . KDD, page 410-418. ACM, (2013)On Discovery of Traveling Companions from Streaming Trajectories., , , , , , and . ICDE, page 186-197. IEEE Computer Society, (2012)Social patterns: Community detection using behavior-generated network datasets., , , , , , , , , and 1 other author(s). NSW, page 82-89. IEEE Computer Society, (2013)Exploiting Frequency Groups for Broadcasting in Multi-channel Multi-radio Networks., , , and . MILCOM, page 1549-1555. IEEE, (2014)Poster abstract: information-maximizing data collection in social sensing using named-data., , , , , , , , , and 3 other author(s). IPSN, page 303-304. IEEE/ACM, (2014)Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints., , , , , , and . DCOSS, page 209-216. IEEE Computer Society, (2014)A Framework of Mining Trajectories from Untrustworthy Data in Cyber-Physical System., , , , , , and . ACM Trans. Knowl. Discov. Data, 9 (3): 16:1-16:35 (2015)