Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fully-Protected Large-Scale Email System Built on Map-Reduce Framework., , and . GPC, volume 6104 of Lecture Notes in Computer Science, page 662-669. Springer, (2010)Elastica and Minimal-Energy Splines., and . Curves and Surfaces, Academic Press, (1991)Analysis and prediction of trajectories using Bayesian network., , and . ICNC, page 3808-3812. IEEE, (2010)Movie Rating and Review Summarization in Mobile Environment., , , , and . IEEE Trans. Syst. Man Cybern. Part C, 42 (3): 397-407 (2012)A New e-Bus System Using Two-Way Government Radio Networks., , , , and . IEEE Intell. Transport. Syst. Mag., 8 (1): 51-60 (2016)An Efficient Anonymous Key Agreement Protocol Based on Chaotic Maps., and . HPCC, page 752-757. IEEE, (2011)Complex event processing for the Internet of Things and its applications., , , , , and . CASE, page 1144-1149. IEEE, (2014)Database Backed by Cloud Data Store for On-premise Applications., , , and . HPCC, page 708-713. IEEE, (2011)Determine Whether Two Line Segments Intersect.. Modeling in Computer Graphics, page 265-274. Springer, (1991)