Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discrete Event Monte-Carlo Simulation of Business Process for Capacity Planning: A Case Study., and . PACIS, page 60. AISeL, (2009)PhishNet: Predictive Blacklisting to Detect Phishing Attacks., , , and . INFOCOM, page 346-350. IEEE, (2010)Self-Localization and Tracking of Multiple robots in Experimental setups., and . I. J. Robotics and Automation, (2012)Variable Selection and Fault Detection Using a Hybrid Intelligent Water Drop Algorithm., , , , and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 225-231. Springer, (2012)Resource Defragmentation Using Market-Driven Allocation in Virtual Desktop Clouds., , , and . IC2E, page 246-255. IEEE Computer Society, (2015)Critical data real-time routing in industrial wireless sensor networks., , and . IET Wireless Sensor Systems, 6 (4): 144-150 (2016)Statistical analysis of load demand distribution at Banaras Hindu University, India., and . ICACCI, page 2318-2323. IEEE, (2016)Evaluating visual analytics for health informatics applications: a systematic review from the American Medical Informatics Association Visual Analytics Working Group Task Force on Evaluation., , , , , , , , , and 5 other author(s). JAMIA, 26 (4): 314-323 (2019)A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain., , , , and . Multimedia Tools Appl., 78 (8): 10227-10263 (2019)Quality-aware UAV coverage and path planning in geometrically complex environments., , , and . Ad Hoc Networks, (2018)