Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chunking-Coordinated-Synthetic Approaches to Large-Scale Kernel Machines., and . International Conference on Computational Science, volume 3036 of Lecture Notes in Computer Science, page 326-333. Springer, (2004)An VoD Scheme with Implicit Error Correction Using Damaged Data., , and . ICCCN, page 1-5. IEEE, (2012)Neural parallel-hierarchical-matching scheduler for input-buffered packet switches., , , , and . IEEE Communications Letters, 6 (5): 220-222 (2002)Efficient implementation of the implicit error correction nVoD schema., , and . Multimedia Tools Appl., 64 (3): 627-647 (2013)Survivable Bluetooth location networks., and . ICC, page 1014-1018. IEEE, (2003)Improving third-party relaying for LTE-A: A realistic simulation approach., and . ICC, page 2344-2350. IEEE, (2014)Bluetooth real-time mobile auctions., , and . PIMRC, page 2024-2028. IEEE, (2005)Bluetooth location networks., and . GLOBECOM, page 233-237. IEEE, (2002)PaaS Federation Analysis for Seamless Creation and Migration of Cloud Applications., , , and . CLOSER, page 156-159. SciTePress, (2013)Cloud Spreadsheets Supporting Data Processing in the Encrypted Domain., , , and . CLOSER, page 514-520. SciTePress, (2015)