Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Offering Supplementary Network Technologies: Adoption Behavior and Offloading Benefits., , and . IEEE/ACM Trans. Netw., 23 (2): 355-368 (2015)Application of cuckoo search in water quality prediction using artificial neural network., , , , , and . Int. J. Comput. Intell. Stud., 6 (2/3): 229-244 (2017)Functionality-rich versus minimalist platforms: a two-sided market analysis., , and . Comput. Commun. Rev., 41 (5): 36-43 (2011)Distributed data recovery architecture based on schema segregation., , , and . ICIT, page 1238-1243. IEEE, (2017)Materialized View Construction Using Linearizable Nonlinear Regression., , and . ACSS (1), volume 395 of Advances in Intelligent Systems and Computing, page 261-276. Springer, (2015)An economic analysis of regulating security investments in the Internet., , and . INFOCOM, page 818-826. IEEE, (2013)Smart data pricing: Lessons from trial planning., , , , and . INFOCOM, page 3327-3332. IEEE, (2013)AMUSE: Empowering users for cost-aware offloading with throughput-delay tradeoffs., , , , , and . INFOCOM, page 435-439. IEEE, (2013)Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating., , and . GLOBECOM, page 911-916. IEEE, (2012)Multiple Vickrey Auctions for Sustainable Electric Vehicle Charging., , , , and . ICIS, Association for Information Systems, (2019)