Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Approach to Generate Frequent Patterns from Enterprise Databases., and . ICAPR (1), volume 3686 of Lecture Notes in Computer Science, page 371-380. Springer, (2005)S-PMIPv6: Efficient Handover of Proxy Mobile IPv6 by Using SCTP., , and . BWCCA, page 287-291. IEEE Computer Society, (2014)Heterogeneous Network Handover Using 3GPP ANDSF., , , , and . AINA, page 171-175. IEEE Computer Society, (2015)The untrusted handover security of the S-PMIPv6 on LTE-A., , , , and . INFOCOM Workshops, page 161-166. IEEE, (2015)A Hybrid Approach to Discover MEC Interview Data with the Hierarchical Value Map of Social Networking Sites as an Example., , and . ASONAM, page 373-376. IEEE Computer Society, (2011)S-PMIPv6: An intra-LMA model for IPv6 mobility., , , , and . J. Netw. Comput. Appl., (2015)Char: An Automatic Way to Describe Characteristics of Data., and . IDEAL, volume 3177 of Lecture Notes in Computer Science, page 366-376. Springer, (2004)Predicting Adolescent Deviant Behaviors through Data Mining Techniques., and . J. Educ. Technol. Soc., 16 (1): 295-308 (2013)