Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent based intrusion prevention and mitigation architecture for software defined networks.. ICTC, page 686-692. IEEE, (2017)Galapagos: A Full Stack Approach to FPGA Integration in the Cloud., , , , and . IEEE Micro, 38 (6): 18-24 (2018)An Online Algorithm for Large Scale Image Similarity Learning., , , and . NIPS, page 306-314. Curran Associates, Inc., (2009)Large Scale Online Learning of Image Similarity through Ranking., , , and . IbPRIA, volume 5524 of Lecture Notes in Computer Science, page 11-14. Springer, (2009)Personalized Messaging Engine: The Next Step in Employee Engagement., , , , and . ICSOC, volume 9435 of Lecture Notes in Computer Science, page 491-494. Springer, (2015)Fast Intent Classification for Spoken Language Understanding Systems., , , , , , and . ICASSP, page 8119-8123. IEEE, (2020)Scaling Deep Social Feeds at Pinterest., , and . SocialCom, page 7-12. IEEE Computer Society, (2013)An Optimal Flow Assignment Framework for Heterogeneous Network Access., , , and . WOWMOM, page 1-12. IEEE Computer Society, (2007)Optimizing Forensic Data Availability and Retention of SDN Forensic Logs by Using Bloom Filter., and . ICOIN, page 305-311. IEEE, (2023)Blockchain-enabled auction for cloud resource provisioning: a survey on trust and economy., , , and . Int. J. Syst. Assur. Eng. Manag., 15 (7): 2787-2807 (July 2024)