Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-based image retrieval using fuzzy perceptual feedback., and . Multimedia Tools Appl., 32 (3): 235-251 (2007)Secure data aggregation without persistent cryptographic operations in wireless sensor networks., , , and . Ad Hoc Networks, 5 (1): 100-111 (2007)Large-scale virtual machines provisioning in clouds: challenges and approaches., , and . Frontiers of Computer Science, 10 (1): 2-18 (2016)A Maximum-Entropy based fast estimation of power quality for smart microgrid., , and . SmartGridComm, page 354-359. IEEE, (2013)Towards adaptive intrusion detection in mobile ad hoc networks., , and . GLOBECOM, page 3551-3555. IEEE, (2004)Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks., , and . GLOBECOM, IEEE, (2006)Algorithms for Answering Geo-Range Query., , and . GLOBECOM, page 1-5. IEEE, (2010)Mobile Telecom Cloud brokerage with orchestrated multi-tier resource pooling., , and . CLOUDNET, page 146-152. IEEE, (2015)RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers., , , , , and . NAS, page 33-42. IEEE Computer Society, (2014)A Concept Semantic Similarity Algorithm Based on Bayesian Estimation., , , and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 209 of Studies in Computational Intelligence, Springer, (2009)