Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Affective Design Approach to Mobile Security Authentication., , , and . IHSED, volume 876 of Advances in Intelligent Systems and Computing, page 554-559. Springer, (2018)Topology Discovery in Large Ethernet Mesh Networks., , and . IEICE Trans. Commun., 89-B (1): 66-75 (2006)Adaptive Logarithmic Increase Congestion Control Algorithm for Satellite Networks., , , , and . KSII Trans. Internet Inf. Syst., 8 (8): 2796-2813 (2014)Recording Your Stress, Can it Help to Prevent Job Stress?, , , , and . HCI (29), volume 851 of Communications in Computer and Information Science, page 429-435. Springer, (2018)Bayesian regression based on principal components for high-dimensional data., and . J. Multivar. Anal., (2013)Using fuzzy logic for localization in mobile sensor networks: simulations and experiments., , and . ACC, page 1-6. IEEE, (2006)Clock Synchronization for One-Way Delay Measurement: A Survey., , , , and . ACN, volume 199 of Communications in Computer and Information Science, page 1-10. Springer, (2011)Asymptotic Properties for Bayesian Neural Network in Besov Space., and . NeurIPS, (2022)Asymmetric SOI CMOS Switch With Series and Parallel Resonators to Enhance Isolation., , , , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (4): 1964-1968 (April 2024)Potential Field Based Hierarchical Structure for Mobile Sensor Network Deployment., , and . ACC, page 5946-5951. IEEE, (2007)