Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource availability-aware advance reservation for parallel jobs with deadlines., , , and . The Journal of Supercomputing, 68 (2): 798-819 (2014)Community Intrusion Detection and Pre-warning System Based on Wireless Mesh Network., , , and . RAM, page 1066-1070. IEEE, (2008)Video Content Authentication Technique Based on Invariant Feature Detection and Cloud Watermark., , and . ISDA (2), page 602-607. IEEE Computer Society, (2008)Towards recommendation to trust-based user groups in social tagging systems., , , and . FSKD, page 893-897. IEEE, (2013)Predicting Future Anxiety and Depression Diagnoses among College Students Utilizing Electronic Health Data., , , , and . AMIA, AMIA, (2015)A new approach to improve the spectrum sensing in distributed multi-sensor networks., , and . WCNIS, page 514-518. IEEE, (2010)The applied research of support vector machine in bus fault identification., and . ICNC, page 1326-1329. IEEE, (2010)Extending Linden Scripting Language on OpenSim., , and . APSEC, page 488-492. IEEE, (2012)Tension Measurement System of Oil Based on Embedded System., , and . CSSE (4), page 972-975. IEEE Computer Society, (2008)978-0-7695-3336-0.Kalman filter based DNS cache poisoning attack detection., , , and . CASE, page 1594-1600. IEEE, (2015)