Your selections:
How much I can rely on you : measuring trustworthiness of a twitter user
- Das, Rajkumar, Karmakar, Gour, Kamruzzaman, Joarder
An efficient data delivery mechanism for AUV-based Ad hoc UASNs
- Karmakar, Gour, Kamruzzaman, Joarder, Nowsheen, Nusrat
Modeling multiuser spectrum allocation for cognitive radio networks
- Bin Shahid, Mohammad, Kamruzzaman, Joarder, Hassan, Md Rafiul
Mining associated patterns from wireless sensor networks
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Share-frequent sensor patterns mining from wireless sensor network data
- Rashid, Md. Mamunur, Gondal, Iqbal, Kamruzzaman, Joarder
Self static interference mitigation scheme for coexisting wireless networks
- Yaqub, Muhammad, Haider, Ammar, Gondal, Iqbal, Kamruzzaman, Joarder
Abrasion modeling of multiple-point defect dynamics for machine condition monitoring
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder, Loparo, Kenneth
An adaptive self-configuration scheme for severity invariant machine fault diagnosis
- Yaqub, Muhammad, Gondal, Iqbal, Kamruzzaman, Joarder
Are you sure you would like to clear your session, including search history and login status?