Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Features for mood prediction in social media., , and . ASONAM, page 1580-1581. ACM, (2015)Optimizing and Extending Serverless Platforms: A Survey., , , , and . SDS, page 1-8. IEEE, (2021)Identifying Differentiating Factors for Cyberbullying in Vine and Instagram., , , , and . SIMBig, volume 1410 of Communications in Computer and Information Science, page 348-361. Springer, (2020)Detection of Cyberbullying Incidents on the Instagram Social Network., , , , , and . CoRR, (2015)The Timewheel Group Membership Protocol., , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 664-680. Springer, (1998)Fault-tolerant mutual exclusion algorithms., and . J. Syst. Softw., 11 (2): 111-129 (1990)MapReduce System over Heterogeneous Mobile Devices., , and . SEUS, volume 5860 of Lecture Notes in Computer Science, page 168-179. Springer, (2009)A Flexible and Intrusion Tolerant Voting Mechanism.. CATA, page 265-270. ISCA, (2005)Batch Rekeying in Mykil Key Management System., , and . IASTED PDCS, page 607-612. IASTED/ACTA Press, (2005)Communication and Synchronization Models in Mobile Agent-Based Computing Systems., and . PDCS, page 442-447. ISCA, (2001)