Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Manzoor, Umar
add a person with the name Manzoor, Umar
 

Other publications of authors with the same name

Potential cyber-attacks against global oil supply chain., , , and . CyberSA, page 1-7. IEEE, (2015)Using Socrative and Smartphones for the support of collaborative learning., , , and . CoRR, (2015)Thermal-aware resource allocation in earliest deadline first using fluid scheduling., , , , , , , , and . IJDSN, (2019)Privacy-aware relationship semantics-based XACML access control model for electronic health records in hybrid cloud., , , , , , , , and . IJDSN, (2019)Autonomous Malicious Activity Inspector - AMAI., , and . NLDB, volume 6177 of Lecture Notes in Computer Science, page 204-215. Springer, (2010)Cognitive Agent for Automated Software Installation - CAASI., and . WSKS (1), volume 5736 of Lecture Notes in Computer Science, page 543-552. Springer, (2009)Simulating Urban Patterns of Life: A Geo-Social Data Generation Framework., , , , , , and . SIGSPATIAL/GIS, page 576-579. ACM, (2019)Multi-Agent Modeling Toolkit - MAMT., and . Simulation Modelling Practice and Theory, (2014)Smart delivery: a cooperative multi-agent framework for optimised delivery service., and . IJKL, 6 (2/3): 240-255 (2010)An Efficient System for Video Stabilization by Differentiating between Intentional and Un-Intentional Jitters., , and . IJKSR, 1 (4): 42-53 (2010)