Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Reliable Underwater Computing System., , and . ICPS, page 467-472. IEEE, (2021)Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks., , , , , and . ICPS, page 168-175. IEEE, (2020)Analytical Performance Modeling of Non-Deterministic Cloud Workflows Using CSM., , and . ISSPIT, page 476-479. IEEE, (2018)Performance analysis of efficient pipeline architectures for underwater big data analytics., , , and . ISCC, page 1014-1019. IEEE Computer Society, (2015)Geometry-Assisted Multi Surface-Gateways Placement Topologies for Underwater Sensor Networks., , , and . ISSPIT, page 1-7. IEEE, (2019)Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-Sensors., , , and . ISCC, page 1-6. IEEE, (2020)Deployment of Multiple Computing Systems in Underwater Wireless Sensor Networks., , , and . ISSPIT, page 1-6. IEEE, (2020)Survey on deep convolutional neural networks in mammography., , , and . ICCABS, page 1. IEEE Computer Society, (2017)Scheduling real time parallel structures on cluster computing with possible processor failures., , and . ISCC, page 62-67. IEEE Computer Society, (2004)Probabilistic controlled airspace infringement tool., and . ISSPIT, page 84-89. IEEE Computer Society, (2015)