Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Transcoding of Internet Content., , , and . JCIS, page 940-943. JCIS / Association for Intelligent Machinery, Inc., (2002)Rapid Prototyping of Mobile Input Devices Using Wireless Sensor Nodes., , , , and . WMCSA, page 21-. IEEE Computer Society, (2003)Dynamic adaptation in an image transcoding proxy for mobile Web browsing., , , , , and . IEEE Personal Commun., 5 (6): 8-17 (1998)Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks., , and . SecureComm, page 113-126. IEEE, (2005)Investigating Factors Influencing the Latency of Cyberbullying Detection., , , , and . CoRR, (2016)Elasticizing Linux via Joint Disaggregation of Memory and Computation., , , , and . CoRR, (2018)Detection of Cyberbullying Incidents on the Instagram Social Network., , , , , and . CoRR, (2015)Wireless Robotic Materials., , , and . SenSys, page 24:1-24:6. ACM, (2017)Making Serverless Computing More Serverless., , , , , , and . IEEE CLOUD, page 456-459. IEEE Computer Society, (2018)Scalable and timely detection of cyberbullying in online social networks., , , , and . SAC, page 1738-1747. ACM, (2018)