Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On building a consistent framework for executable systems architecture., and . Journal of Systems and Software, (2014)Non-Rigid Structure-From-Motion With Uniqueness Constraint and Low Rank Matrix Fitting Factorization.. IEEE Trans. Multimedia, 16 (5): 1350-1357 (2014)Building Energy Management Through Fault Detection Analysis Using Pattern Recognition Techniques Applied on Residual Neural Networks., , , , and . WIVACE, volume 445 of Communications in Computer and Information Science, page 1-12. Springer, (2014)Getting Virtualized Wireless Sensor Networks' IaaS Ready for PaaS., , , , and . DCOSS, page 224-229. IEEE Computer Society, (2015)A Robust Signal Detection Scheme for 5G Massive Multiuser MIMO Systems.. IEEE Trans. Vehicular Technology, 67 (10): 9597-9604 (2018)I-nice: A new approach for identifying the number of clusters and initial cluster centres., , , , , and . Inf. Sci., (2018)Towards Efficient, Work-Conserving, and Fair Bandwidth Guarantee in Cloud Datacenters., , and . IEEE Access, (2019)An Easy Network Onboarding Scheme for Internet of Things Networks., , , and . IEEE Access, (2019)Does culture matter in effectiveness of social media marketing strategy? An investigation of brand fan pages., , and . Aslib J. Inf. Manag., 68 (6): 694-715 (2016)An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data., , , and . The Journal of Supercomputing, 74 (8): 3685-3703 (2018)