Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure RAID schemes from EVENODD and STAR codes., and . ISIT, page 609-613. IEEE, (2017)Secret sharing with optimal decoding and repair bandwidth., and . ISIT, page 1813-1817. IEEE, (2017)Limit Cycles Bifurcations for a Class of Kolmogorov Model in Symmetrical Vector Field., , and . Int. J. Bifurc. Chaos, (2014)Multicast Capacity in MANET with Infrastructure Support., , , , and . IEEE Trans. Parallel Distributed Syst., 25 (7): 1808-1818 (2014)Communication Efficient Secret Sharing., , , and . CoRR, (2015)Stochastic Neuron Model with Dynamic Synapses and Evolution Equation of Its Density Function., , , and . ICNC (1), volume 3610 of Lecture Notes in Computer Science, page 449-455. Springer, (2005)Limit Cycles in a Model of Olfactory Sensory Neurons., , , and . Int. J. Bifurc. Chaos, 29 (3): 1950038:1-1950038:9 (2019)Population stochastic dynamics for synaptic depression., , and . Neurocomputing, 72 (1-3): 630-635 (2008)Field demonstration of simultaneous wind and temperature measurements from 5to50 km with a Na double-edge magneto-optic filter in a multi-frequency Doppler lidar, , , , , , , , , and 2 other author(s). Opt. Lett., 34 (10): 1552--1554 (2009)Delay and Capacity Tradeoff Analysis for MotionCast., , , , and . IEEE/ACM Trans. Netw., 19 (5): 1354-1367 (2011)