Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal sanitization synthesis for web application vulnerability repair., , , , , and . ISSTA, page 189-200. ACM, (2016)Clustering iOS executable using self-organizing maps., , , and . IJCNN, page 1-8. IEEE, (2013)Improving the genetic-algorithm-optimized wavelet neural network for stock market prediction., , , , and . IJCNN, page 3038-3042. IEEE, (2014)Network-traffic anomaly detection with incremental majority learning., , , and . IJCNN, page 1-8. IEEE, (2015)Urban Traffic Information Service Application Grid., , , , , , , , , and 3 other author(s). J. Comput. Sci. Technol., 20 (1): 134-140 (2005)Quantitative Analysis of Cloud-Based Streaming Services., , and . IEEE SCC, page 216-223. IEEE Computer Society, (2013)On the use of cloud computing for geospatial workflow applications., , , , and . Geoinformatics, page 1-6. IEEE, (2012)NEBULA: A P2P Based Cooperative Spatial Database Prototype., , , , , and . GCC, page 125-132. IEEE Computer Society, (2007)Efficient multi-match packet classification with TCAM., and . Hot Interconnects, page 28-34. IEEE Computer Society, (2004)Efficient testability enhancement for combinational circuit., and . ICCD, page 168-179. IEEE Computer Society, (1995)