Author of the publication

A Report of the Privacy in Data Mining: Speakers Survey

, , , , and . International Journal of Innovative Science and Modern Engineering (IJISME), 2 (4): 4-6 (March 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Devaki,
add a person with the name Devaki,
 

Other publications of authors with the same name

Applying an organizational learning perspective to new technology deployment by technological gatekeepers: A theoretical model and key issues for future research., and . Inf. Syst. Frontiers, 12 (3): 287-297 (2010)Evolution of Timing Services From 5G-A Toward 6G., , and . IEEE Access, (2023)Global Communications Newsletter., , , , , , , , and . IEEE Commun. Mag., 60 (7): 21-26 (2022)3GPP Non-Public Network Security., , , , , and . J. ICT Stand., 8 (1): 57-76 (2020)A Scalable and Flexible Radio Access Network Architecture for Fifth Generation Mobile Networks., , , , , , , , , and . IEEE Communications Magazine, 54 (11): 16-23 (2016)5G multi-RAT multi-connectivity architecture., , , , , and . ICC Workshops, page 180-186. IEEE, (2016)Guest editorial for the special section on "Technology acceptance, usage, and competitive advantage"., , , and . Inf. Syst. Frontiers, 12 (3): 235-237 (2010)FireNet: Real-time Segmentation of Fire Perimeter from Aerial Video., , , , , , , and . CoRR, (2019)Smart safety watch for elderly people and pregnant women., , , , , and . CoRR, (2023)Perspectives on a 6G Architecture., , , , and . CoRR, (2022)