Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Word Alignment Through Morphological Analysis., , , , , and . IUKM, volume 9376 of Lecture Notes in Computer Science, page 315-325. Springer, (2015)Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks., , and . ISPACS, page 471-475. IEEE, (2013)Predictive Blacklisting as an Implicit Recommendation System., , and . INFOCOM, page 1640-1648. IEEE, (2010)NC-Audit: Auditing for Network Coding Storage, and . CoRR, (2012)Interest Rate Volatility and No-Arbitrage Affine Term Structure Models., and . Manag. Sci., 67 (12): 7391-7416 (2021)MicroCast: Cooperative Video Streaming Using Cellular and Local Connections., , , , , and . IEEE/ACM Trans. Netw., 24 (5): 2983-2999 (2016)Predictive Blacklisting as an Implicit Recommendation System, , and . CoRR, (2009)Interactive Exploration of Subspace Clusters for High Dimensional Data., , , , , and . DEXA (1), volume 10438 of Lecture Notes in Computer Science, page 327-342. Springer, (2017)Demo: AntMonitor: Network Traffic Monitoring and Real-Time Prevention of Privacy Leaks in Mobile Devices., , , , , and . S3@MobiCom, page 22. ACM, (2015)Anytime OPTICS: An Efficient Approach for Hierarchical Density-Based Clustering., , and . DASFAA (1), volume 9642 of Lecture Notes in Computer Science, page 164-179. Springer, (2016)