Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implantable RFID Chips - Security versus Ethics.. FIDIS, volume 262 of IFIP Advances in Information and Communication Technology, page 151-157. Springer, (2007)Understanding Vaccine Innovation System in India.. J. Sci. Res., 5 (3): 236-237 (2016)A decision support system to find the best water allocation strategies in a Mediterranean river basin in future scenarios of global change., , , and . J. Exp. Theor. Artif. Intell., 28 (1-2): 331-350 (2016)Threshold-Based Direct Computation of Skyline Objects for Database with Uncertain Preferences., , , , and . PRICAI, volume 9810 of Lecture Notes in Computer Science, page 193-205. Springer, (2016)Integrated Fuzzy Approach for System Modeling and Risk Assessment., , and . MDAI, volume 3885 of Lecture Notes in Computer Science, page 227-238. Springer, (2006)Trust Management Models for Digital Identities., and . IJVCSN, 8 (4): 1-24 (2016)On Discrete Residual and Past Measures of Inaccuracy., , and . JSTA, 12 (1): 120-128 (2013)A Framework for Collaborative and Convenient Learning on Cloud Computing Platforms., and . IJWLTT, 12 (2): 1-20 (2017)Partitioning total variance in risk assessment: Application to a municipal solid waste incinerator., , , and . Environmental Modelling and Software, 24 (2): 247-261 (2009)"Where Far Can Be Close": Finding Distant Neighbors In Recommender Systems., , , , and . LocalRec@RecSys, volume 1405 of CEUR Workshop Proceedings, page 13-20. CEUR-WS.org, (2015)