Author of the publication

An Erase Efficiency Boosting Strategy for 3D Charge Trap NAND Flash.

, , , , and . IEEE Trans. Computers, 67 (9): 1246-1258 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Improvement on a Remote User Authentication Scheme Using Smart Cards., , and . ISA, volume 76 of Communications in Computer and Information Science, page 9-16. Springer, (2010)Generalized rate monotonic schedulability bounds using relative period ratios., , , and . Inf. Process. Lett., 107 (5): 142-148 (2008)Smallest Bipartite Bridge-Connectivity Augmentation., , , , and . Algorithmica, 54 (3): 353-378 (2009)An O(n² log n) Algorithm for the Hamiltonian Cycle Problem on Circular-Arc Graphs., , and . SIAM J. Comput., 21 (6): 1026-1046 (1992)Power-Aware Scheduling for Parallel Security Processors with Analytical Models., , , , , and . LCPC, volume 3602 of Lecture Notes in Computer Science, page 470-484. Springer, (2004)Practical considerations on end-to-end cellular/PWLAN architecture in support of bilateral roaming., , , and . WCNC, page 1702-1707. IEEE, (2005)Enhanced bulk scheduling for supporting delay sensitive streaming applications., , , and . Comput. Networks, 52 (5): 971-987 (2008)Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment., and . Comput. Stand. Interfaces, 31 (6): 1118-1123 (2009)Bulk Scheduling for Delay Sensitive Streaming Applications., , , and . GLOBECOM, IEEE, (2006)Reversible video data hiding using neighbouring similarity., , , and . IET Signal Process., 8 (6): 579-587 (2014)