Author of the publication

An Adaptive Recommendation Trust Model in Multiagent System.

, , and . IAT, page 462-465. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Farm-inspired Computational Cluster in the Cloud., , , and . CloudCom, page 730-737. IEEE Computer Society, (2011)Transforming animals in a cyber-behavioral biometric menagerie with Frog-Boiling attacks., , , and . BTAS, page 289-296. IEEE, (2012)Scan-Based Evaluation of Continuous Keystroke Authentication Systems., , , , , , , , , and . IT Professional, 15 (4): 20-23 (2013)Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds., , and . IEEE Trans. Information Forensics and Security, 8 (6): 963-972 (2013)A Standard for Software Documentation.. IEEE Computer, 30 (10): 97-98 (1997)Wireless Sensor Networks - Security, Coverage, and Localization, , and . Springer, (2016)Can a Course Be Taught Entirely Via Email?. Commun. ACM, 42 (9): 29-30 (1999)Corrections to "Image Recovery and Segmentation Using Competitive Learning in a Layered Network., and . IEEE Trans. Neural Networks, 7 (6): 1547 (1996)A parallel decision tree-based method for user authentication based on keystroke patterns., , and . IEEE Trans. Systems, Man, and Cybernetics, Part B, 35 (4): 826-833 (2005)An Adaptive Web Cache Access Predictor Using Neural Network., , and . IEA/AIE, volume 2358 of Lecture Notes in Computer Science, page 450-459. Springer, (2002)