Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Access Pattern Analysis on Stream Mining Algorithms for Cloud Computation., , and . PDPTA, page 36-42. CSREA Press, (2010)A preceding activation scheme with graph unfolding for the parallel processing system-array., , , and . SC, page 675-684. ACM, (1989)Editor's Message to Special Issue of Young Researchers' Papers.. J. Inf. Process., (2018)A study on individual mobility patterns based on individuals' familiarity to visited areas., and . Int. J. Pervasive Comput. Commun., 12 (1): 23-48 (2016)User-centric Distributed Route Planning in Smart Cities based on Multi-objective Optimization., , , , , , , , and . SMARTCOMP, page 77-82. IEEE, (2021)Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption., , , , and . SMARTCOMP, page 229-234. IEEE, (2022)Identifying Protein Short Linear Motifs by Position-Specific Scoring Matrix., , , and . ICSI (2), volume 9713 of Lecture Notes in Computer Science, page 206-214. Springer, (2016)Decoy Effect of Recommendation Systems on Real E-commerce Websites., , , , and . IntRS@RecSys, volume 3222 of CEUR Workshop Proceedings, page 151-163. CEUR-WS.org, (2022)Hybrid Phishing URL Detection Using Segmented Word Embedding., and . iiWAS, volume 13635 of Lecture Notes in Computer Science, page 507-518. Springer, (2022)MCMalloc: A scalable memory allocator for multithreaded applications on a many-core shared-memory machine., and . IEEE BigData, page 4846-4848. IEEE Computer Society, (2017)