Author of the publication

Data-Driven Methods for SMS-Based FAQ Retrieval.

, , and . FIRE, volume 7536 of Lecture Notes in Computer Science, page 104-118. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achievable secrecy capacity in an underlay cognitive radio network., , and . CNS, page 1-6. IEEE, (2014)Outage probability and ergodic capacity of underlay cognitive radio systems with adaptive power transmission., , and . IWCMC, page 785-790. IEEE, (2013)Parallel and I/O-efficient Randomisation of Massive Networks using Global Curveball Trades., , , , , and . ESA, volume 112 of LIPIcs, page 11:1-11:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2018)Impact of Secondary User Communication on Security Communication of Primary User., , and . CoRR, (2014)On non-zero secrecy capacity and outage probability of cognitive radio networks., , , and . WPMC, page 1-6. IEEE, (2013)On throughput and quality of experience in cognitive radio networks., , and . WCNC, page 1-5. IEEE, (2016)Leveraging advanced technologies and operation excellence to build the world's first Knowledge as a Service (KaaS) platform.. SoICT, page 7. ACM, (2017)Cognitive Proactive and Reactive DF Relaying Schemes under Joint Outage and Peak Transmit Power Constraints., , and . IEEE Communications Letters, 17 (8): 1548-1551 (2013)On Security and Throughput for Energy Harvesting Untrusted Relays in IoT Systems Using NOMA., , , , , , and . IEEE Access, (2019)Cognitive amplify-and-forward relay networks with beamforming under primary user power constraint over Nakagami-m fading channels., , , , and . Wireless Communications and Mobile Computing, 15 (1): 56-70 (2015)