From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Securing app distribution process of iOS exploiting the notion of authentic update., , и . NSysS, стр. 1-8. IEEE, (2016)Fault-tolerant design method for tizen applications considering core- and API-level faults., и . NSysS, стр. 116-121. ACM, (2019)Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks., , , и . Wirel. Sens. Netw., 2 (7): 538-554 (2010)An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh., , , , , и . CoRR, (2020)Leveraging a Smartwatch for Activity Recognition in Salat., , , , и . IEEE Access, (2023)An Intelligent IoT Approach for Analyzing and Managing Crowds., , , , , , , и . IEEE Access, (2021)Fault Tolerance Analysis of Car-Following Models for Autonomous Vehicles., , и . IEEE Trans. Intell. Transp. Syst., 23 (11): 20036-20045 (2022)Towards Greening MapReduce Clusters Considering Both Computation Energy and Cooling Energy., , , , и . IEEE Trans. Parallel Distributed Syst., 32 (4): 931-942 (2021)Securing Highly-Sensitive Information in Smart Mobile Devices through Difficult-to-Mimic and Single-Time Usage Analytics., , , , и . MobiQuitous, стр. 322-331. ACM, (2018)A Tale of a Deep Learning Approach to Image Forgery Detection., и . NSysS, стр. 102-110. IEEE, (2018)