Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network., , and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 675-684. Springer, (2011)Low-Power Digital Signal Processing Using Approximate Adders., , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 32 (1): 124-137 (2013)Energy Efficient and QoS Aware Multi-Level Mobile Cloud Offloading., , and . HPCC/DSS/SmartCity/DependSys, page 1084-1091. IEEE, (2021)Data-driven IQC-Based Robust Control Design for Hybrid Micro-disturbance Isolation Platform., , and . CDC, page 6079-6085. IEEE, (2023)RoboAnalyzer: Robot Visualization Software for Robot Technicians., , and . AIR, page 26:1-26:5. ACM, (2017)Three-stage computed-torque controller for trajectory tracking in non-holonomic wheeled mobile robot., , , and . AMC, page 144-149. IEEE, (2018)The evidence for the effectiveness of safety alerts in electronic patient medication record systems at the point of pharmacy order entry: a systematic review., , , and . BMC Medical Informatics Decis. Mak., (2013)Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack., , , and . SERE, page 291-300. IEEE, (2012)An Enhanced Advising Model in Teacher-Student Framework using State Categorization., , , and . AAAI, page 6653-6660. AAAI Press, (2021)Action Selection for Composable Modular Deep Reinforcement Learning., , , and . AAMAS, page 565-573. ACM, (2021)