Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An analytic spatial filter and a hidden Markov model for enhanced information transfer rate in EEG-based brain computer interfaces., , and . ICASSP, page 602-605. IEEE, (2010)Energy Efficient Software Matching in Distributed Vehicular Fog Based Architecture with Cloud and Fixed Fog Nodes., , , and . ICTON, page 1-4. IEEE, (2020)A design technique overview on broadband RF ESD protection circuit designs., , , , , , , , and . MWSCAS, page 590-593. IEEE, (2012)DepTaint: A Static Taint Analysis Method Based on Program Dependence., , , , and . ICMSS, page 34-41. ACM, (2020)Multi-Source Weak Supervision Fusion for Disaster Scene Recognition in Videos., , , , and . MIPR, page 287-292. IEEE, (2022)An Improved Energy Management Strategy for Multi-Stack Fuel Cells Based on Hierarchical Strategy., , , , , and . IECON, page 1-6. IEEE, (2023)Defenses Against Wormhole Attacks in Wireless Sensor Networks., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 413-426. Springer, (2017)Simulation Analysis of Fiber Optic Magnetic Sensor., , , and . ICAIT, page 5-9. IEEE, (2018)Necessary and sufficient conditions for reliability of posterior matching in arbitrary dimensions., and . ISIT, page 2366-2370. IEEE, (2014)Generalizing the Posterior Matching Scheme to higher dimensions via optimal transportation., and . Allerton, page 96-102. IEEE, (2011)