Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack., , , and . SERE, page 291-300. IEEE, (2012)The evidence for the effectiveness of safety alerts in electronic patient medication record systems at the point of pharmacy order entry: a systematic review., , , and . BMC Medical Informatics Decis. Mak., (2013)An Enhanced Advising Model in Teacher-Student Framework using State Categorization., , , and . AAAI, page 6653-6660. AAAI Press, (2021)Unfreezing Social Navigation: Dynamical Systems based Compliance for Contact Control in Robot Navigation., , and . ICRA, page 8368-8374. IEEE, (2022)Make Your Query Anonymous With Oblivious Transfer., , and . ICCCT, page 345-349. ACM, (2015)A Characterization of Wireless NIC Active Scanning Algorithms., , and . WCNC, page 2385-2390. IEEE, (2007)Action Selection for Composable Modular Deep Reinforcement Learning., , , and . AAMAS, page 565-573. ACM, (2021)Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network., , and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 675-684. Springer, (2011)Low-Power Digital Signal Processing Using Approximate Adders., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 32 (1): 124-137 (2013)Energy Efficient and QoS Aware Multi-Level Mobile Cloud Offloading., , and . HPCC/DSS/SmartCity/DependSys, page 1084-1091. IEEE, (2021)