Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Untraceability of mobile devices in wireless mesh networks using linear network coding., , , and . INFOCOM, page 270-274. IEEE, (2013)Efficient Integration of PROLOG and Relational Databases in the NED Intelligent Information System., , , , , , , , , and . IKE, page 364-369. CSREA Press, (2003)Multi-Class MPLS Resilience Mechanism Supporting Traffic Engineering., , , and . PDCAT, page 393-398. IEEE Computer Society, (2006)Automatic Image-Based Pencil Sketch Rendering., , , , and . J. Comput. Sci. Technol., 17 (3): 347-355 (2002)Inference and learning methodology of belief-rule-based expert system for pipeline leak detection., , , , , , and . Expert Syst. Appl., 32 (1): 103-113 (2007)Application of MADM in a fuzzy environment for selecting the best barrier for offshore wells., , , and . Expert Syst. Appl., 39 (3): 2466-2478 (2012)Sketch2Jewelry: Semantic feature modeling for sketch-based jewelry design., , , , and . Computers & Graphics, (2014)An enhanced fall detection system for elderly person monitoring using consumer home networks., , , , and . IEEE Trans. Consumer Electronics, 60 (1): 23-29 (2014)SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding., , , and . HPCC/EUC, page 2298-2305. IEEE, (2013)Human action categorization using Conditional Random Field., , , and . RiiSS, page 131-135. IEEE, (2011)