Author of the publication

An Algorithm to Detect the Automobiles Using the Copied Vehicle License.

, , , , and . CloudComp, volume 142 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 225-231. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gray BP neural network based prediction of rice protein interaction network., , , , and . Cluster Computing, 22 (Supplement): 4165-4171 (2019)Optimal power grid protection through a defender-attacker-defender model., , and . Rel. Eng. & Sys. Safety, (2014)A Utility-Optimal Backoff Algorithm for Clustered Sensor Networks., , , , and . VTC Spring, page 158-162. IEEE, (2008)Capacity Maximization for Variable-Width WLANs: A Game-Theoretic Approach., , and . ICC, page 1-5. IEEE, (2010)Applying Formal Methods to Modeling and Analysis of Real-time Data Streams., , , and . JCSE, 5 (1): 85-110 (2011)Design and implementation of optical wireless communications with optically powered smart dust motes., , , , , , , and . IEEE Journal on Selected Areas in Communications, 27 (9): 1646-1653 (2009)QoS Management in Replicated Real Time Databases., , , and . RTSS, page 86-97. IEEE Computer Society, (2003)Towards Efficient Deployment of Cloud Applications through Dynamic Reverse Proxy Optimization., , , and . HPCC/EUC, page 651-658. IEEE, (2013)An Algorithm to Detect the Automobiles Using the Copied Vehicle License., , , , and . CloudComp, volume 142 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 225-231. Springer, (2014)Contact Force Analysis of a Rotor-Brush Seal System With Eccentricity and Airflow., , and . IEEE Access, (2019)