Author of the publication

Hardware/software cosynthesis: multiple constraint satisfaction and component retrieval.

, , , and . ICECCS, page 383-390. IEEE Computer Society, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP)., and . ICETET, page 1228-1231. IEEE Computer Society, (2008)Handover prediction strategy for 3G-WLAN overlay networks., , , and . NOMS, page 819-822. IEEE, (2008)Crash recovery with little overhead., and . ICDCS, page 454-461. IEEE Computer Society, (1991)Secure access of multiple keywords over encrypted data in cloud environment using ECC-PKI and ECC ElGamal., , and . PKIA, page 49-56. IEEE, (2017)PEQ: A Privacy-Preserving Scheme for Exact Query Evaluation in Distributed Sensor Data Networks., , , and . SRDS, page 189-198. IEEE Computer Society, (2009)Security Framework for Agent-Based Cloud Computing., , , and . IJIMAI, 3 (3): 35-42 (2015)Eliminating Location Dependent Unfairness in WLANs., and . VTC Fall, page 1-5. IEEE, (2006)Artificial immune system based mobile agent platform protection., , , , and . Computer Standards & Interfaces, 35 (4): 365-373 (2013)CP2EH: a comprehensive privacy-preserving e-health scheme over cloud., , , and . J. Supercomput., 78 (2): 2386-2416 (2022)QoE preserving resource scheduling for M2M terminals and human users in LTE networks., and . IJAHUC, 19 (3/4): 254-265 (2015)