Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy saving by Base Station pooling: A signaling framework., , , , and . Wireless Days, page 1-7. IEEE, (2012)An approach of efficient and resistive digital watermarking using SVD., , and . ICACCI, page 2470-2475. IEEE, (2014)Compact thermal modeling for package design with practical power maps., , , , and . IGCC, page 1-5. IEEE Computer Society, (2011)The Digital Future: reflecting on the "Dark Side" of Information Technology Use., , , , and . AMCIS, Association for Information Systems, (2012)Overcoming Email Addiction: Understanding the 'Leave Me Alone!' Approach., , and . AMCIS, page 128. Association for Information Systems, (2009)Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications., , , , , , , , and . INFOCOM, IEEE, (2006)Making Views Self-Maintainable for Data Warehousing., , , and . PDIS, page 158-169. IEEE Computer Society, (1996)3D deep learning for detecting pulmonary nodules in CT scans., , and . JAMIA, 25 (10): 1301-1310 (2018)Game Theory based Early Classification of Rivers using Time Series Data., , , , , and . WF-IoT, page 686-691. IEEE, (2019)A Dual Association Model for Acquisition and Extinction., and . AI*IA, volume 6934 of Lecture Notes in Computer Science, page 139-150. Springer, (2011)