Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VoIP: making secure calls and maintaining high call quality., , , , and . MoMM, page 56-62. ACM, (2010)Neural-Network-Based Models for Short-Term Traffic Flow Forecasting Using a Hybrid Exponential Smoothing and Levenberg-Marquardt Algorithm., , , and . IEEE Trans. Intell. Transp. Syst., 13 (2): 644-654 (2012)Service level agreement (SLA) assurance for cloud services: a survey from a transactional risk perspective., , and . MoMM, page 263-266. ACM, (2012)A User-Based Early Warning Service Management Framework in Cloud Computing., , , , , and . Comput. J., 58 (3): 472-496 (2015)ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys., , , , , , and . 3PGCIC, page 465-470. IEEE Computer Society, (2010)A framework for patient practitioner information exchange., , and . CBMS, page 408-414. IEEE Computer Society, (2010)Web-of-things framework for cyber-physical systems., , , , and . Concurr. Comput. Pract. Exp., 23 (9): 905-923 (2011)Watermarking technique for wireless multimedia sensor networks: a state of the art., , and . CUBE, page 832-840. ACM, (2012)Selection of Significant On-Road Sensor Data for Short-Term Traffic Flow Forecasting Using the Taguchi Method., , , , , and . IEEE Trans. Ind. Informatics, 8 (2): 255-266 (2012)Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance., , , , , and . NBiS, page 597-602. IEEE Computer Society, (2009)