Author of the publication

An Effective Retrieval Approach for Documents Related to Past Civil Engineering Projects.

, and . WETICE, page 295-300. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Power Equipment Management Based on Distributed Context-Aware Inference in Smart Cities., , , , and . IEEE Communications Magazine, 56 (7): 212-217 (2018)A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy., , , , , and . Concurrency and Computation: Practice and Experience, (2017)Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms., , and . Concurrency and Computation: Practice and Experience, (2018)Encryption-Based Solution for Data Sovereignty in Federated Clouds., , and . IEEE Cloud Computing, 3 (1): 12-17 (2016)Healthcare-Related Data in the Cloud: Challenges and Opportunities., , , and . IEEE Cloud Computing, 3 (6): 10-14 (2016)How to Assess the Dependability of Applications on Top of the Blockchain: Novel Research Challenges., and . EDCC, page 164-165. IEEE Computer Society, (2018)Dealing with Reliable Event-Based Communications by Means of Layered Multicast., , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 572-581. Springer, (2015)Optimal Data Replica Placement in Large-Scale Federated Architectures., , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 257-267. (2016)Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks., , , , and . NBiS, page 70-75. IEEE Computer Society, (2016)Distributed strategic learning and game theoretic formulation of network embedded coding., , , and . J. Comput. Science, (2018)