Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Fake Feedback for Effective Trust Management in Cloud Environments., , , , and . ICSOC Workshops, volume 7759 of Lecture Notes in Computer Science, page 47-58. Springer, (2013)Experimentation and Analysis of Ensemble Deep Learning in IoT Applications., , , , and . Open J. Internet Things, 5 (1): 133-149 (2019)SourceVote: Fusing Multi-valued Data via Inter-source Agreements., , , , , and . ER, volume 10650 of Lecture Notes in Computer Science, page 164-172. Springer, (2017)Social-PPM: Personal Experience Sharing and Recommendation., , and . CIC, page 29-36. IEEE Computer Society, (2016)Query Size Estimation Using Machine Learning., , and . DASFAA, volume 6 of Advanced Database Research and Development Series, page 97-106. World Scientific, (1997)Flexible IoT middleware for integration of things and applications., , and . CollaborateCom, page 481-488. ICST / IEEE, (2014)Improving Query Effectiveness for Large Image Databases with Multiple Visual Feature Combination., , , and . DASFAA, volume 2973 of Lecture Notes in Computer Science, page 857-868. Springer, (2004)Semantic Brokering over Dynamic Heterogeneous Data Sources in InfoSleuth., , and . ICDE, page 358-365. IEEE Computer Society, (1999)Transaction Modeling.. ICDE, page 234-241. IEEE Computer Society, (1989)Firewall Queries., , , and . OPODIS, volume 3544 of Lecture Notes in Computer Science, page 197-212. Springer, (2004)