Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GlYFF: A framework for global yield and floorplan aware design optimization., , and . ISQED, page 70-76. IEEE, (2015)A new paradigm for trading off yield, area and performance to enhance performance per wafer., , and . DATE, page 1753-1758. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Channel and traffic status aware relay selection and traffic queue analysis in wireless user-relaying networks., , , and . WTS, page 1-5. IEEE, (2012)Large-Scale Cross-Modality Search via Collective Matrix Factorization Hashing., , , and . IEEE Trans. Image Processing, 25 (11): 5427-5440 (2016)Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services., , , , , and . IEEE Internet of Things Journal, 6 (2): 1584-1593 (2019)Stereotime: a wireless 2D and 3D switchable video communication system., , , , , , , and . ACM Multimedia, page 473-474. ACM, (2013)Sparse Representation for Wireless Communications: A Compressive Sensing Approach., , , , and . IEEE Signal Process. Mag., 35 (3): 40-58 (2018)Handling scheduling uncertainties through traffic shaping in Time-Triggered train networks., , , , , and . IWQoS, page 1-6. IEEE, (2017)An adaptive coupling method for exterior anisotropic elliptic problems., , and . Appl. Math. Comput., (2016)Malicious User Detection Based on Low-Rank Matrix Completion in Wideband Spectrum Sensing., , and . IEEE Trans. Signal Process., 66 (1): 5-17 (2018)