From post

Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment.

, и . ICCDA, стр. 54-59. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks., , и . Inf. Secur. J. A Glob. Perspect., 17 (5&6): 267-277 (2008)Choice-Based Authentication: A Usable-Security Approach., , и . HCI (4), том 8513 из Lecture Notes in Computer Science, стр. 114-124. Springer, (2014)Audio-Visual Communication Research. Journal of Educational Research, 49 (5): 321--330 (1956)Proactive reputation-based defense for MANETs using radial basis function neural networks., , , и . IJCNN, стр. 1-6. IEEE, (2010)On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems., и . SAINT, стр. 242-248. IEEE Computer Society, (2003)Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment., и . ICCDA, стр. 54-59. ACM, (2017)The ISDF Framework: Towards Secure Software Development., и . J. Inf. Process. Syst., 6 (1): 91-106 (2010)FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning., , , и . ICIOT, том 10972 из Lecture Notes in Computer Science, стр. 121-133. Springer, (2018)Usablity and security trade-off: a design guideline., и . ACM Southeast Regional Conference, стр. 21:1-21:6. ACM, (2014)RAAODV: a reputation-aware AODV for mobile ad hoc networks., и . ACM Southeast Regional Conference, стр. 6:1-6:6. ACM, (2014)