default search action
Munirul M. Haque
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c17]Masud Rabbani, Munirul M. Haque, Dipranjan Das Dipal, Md Ishrak Islam Zarif, Anik Iqbal, Amy J. Schwichtenberg, Naveen Bansal, Tanjir Rashid Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal Ahamed:
MPredA: A Machine Learning Based Prediction System to Evaluate the Autism Level Improvement. PervasiveHealth 2021: 416-432 - 2020
- [c16]Munirul M. Haque, Dipranjan Das Dipal, Masud Rabbani, Md Ishrak Islam Zarif, Anik Iqbal, Shaheen Akhter, Shahana Parveen, Mohammad Rasel, Basana Rani Muhuri, Tanjir Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal Ahamed:
Towards Developing A Mobile-Based Care for Children with Autism Spectrum Disorder (mCARE) in low and Middle-Income Countries (LMICs) Like Bangladesh. COMPSAC 2020: 746-753
2010 – 2019
- 2014
- [c15]Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan:
OTIT: towards secure provenance modeling for location proofs. AsiaCCS 2014: 87-98 - [c14]Munirul M. Haque, Ferdaus Ahmed Kawsar, Mohammad Adibuzzaman, Sheikh Iqbal Ahamed, Richard Love, Rumana Dowla, David Roe, Tahmina Ferdousy, Reza Selim:
Findings of mobile based palliative care system: towards formulating a generic framework for measuring QoL. PervasiveHealth 2014: 1-8 - 2013
- [c13]Mainul Mizan, Md. Lutfor Rahman, Rasib Khan, Munirul M. Haque, Ragib Hasan:
Accountable proof of ownership for data using timing element in cloud services. HPCS 2013: 57-64 - [c12]Mohammad Adibuzzaman, Niharika Jain, Nicholas Steinhafel, Munirul M. Haque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love:
Towards in situ affect detection in mobile devices: a multimodal approach. RACS 2013: 454-460 - 2011
- [c11]Chowdhury Sharif Hasan, Mohammad Adibuzzaman, Ferdaus Ahmed Kawsar, Munirul M. Haque, Sheikh Iqbal Ahamed:
PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment. IEA/AIE (1) 2011: 135-145 - [c10]Munirul M. Haque, Mohammad Adibuzzaman, David Polyak, Niharika Jain, Sheikh Iqbal Ahamed, Lin Liu:
IRENE: Context aware mood sharing for social network. SOCA 2011: 1-8 - 2010
- [j5]Sheikh Iqbal Ahamed, Munirul M. Haque, Md. Endadul Hoque, Farzana Rahman, Nilothpal Talukder:
Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. J. Syst. Softw. 83(2): 253-270 (2010) - [j4]Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder:
A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment. Telecommun. Syst. 44(3-4): 221-240 (2010)
2000 – 2009
- 2008
- [j3]Munirul M. Haque, Sheikh Iqbal Ahamed:
An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. IEEE Trans. Syst. Man Cybern. Part C 38(3): 334-346 (2008) - [c9]Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder:
Service sharing with trust in pervasive environment: now it's time to break the jinx. SAC 2008: 1622-1628 - 2007
- [c8]Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi:
A Robust Lightweight Solution for RFID Security. AINA Workshops (2) 2007: 182-187 - [c7]Munirul M. Haque, Sheikh Iqbal Ahamed:
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. COMPSAC (1) 2007: 49-56 - [c6]Munirul M. Haque, Sheikh Iqbal Ahamed, Haifeng Li, K. M. Ibrahim Asif:
An Authentication based Lightweight Device Discovery (ALDD) Model for Pervasive Computing Environment. COMPSAC (1) 2007: 57-64 - [c5]Sheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif:
S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment. ITNG 2007: 303-310 - [c4]Sheikh Iqbal Ahamed, Nilothpal Talukder, Munirul M. Haque:
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment. MobiQuitous 2007: 1-6 - [c3]Shameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque:
Self-healing for autonomic pervasive computing. SAC 2007: 110-111 - [c2]Sheikh Iqbal Ahamed, Munirul M. Haque, Karl Stamm, Ahmed J. Khan:
Wellness assistant: a virtual wellness assistant using pervasive computing. SAC 2007: 782-787 - 2006
- [j2]Sheikh Iqbal Ahamed, Moushumi Sharmin, Shameem Ahmed, Munirul M. Haque, Ahmed J. Khan:
Design and implementation of a virtual assistant for healthcare professionals using pervasive computing technologies. Elektrotech. Informationstechnik 123(4): 112-120 (2006) - [j1]Munirul M. Haque, Sheikh Iqbal Ahamed:
Security in Pervasive Computing: Current Status and Open Issues. Int. J. Netw. Secur. 3(3): 203-214 (2006) - [c1]Munirul M. Haque, Sheikh Iqbal Ahamed:
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. ICPP Workshops 2006: 189-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint