Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Registration algorithm of point clouds based on multiscale normal features., , , and . J. Electronic Imaging, 24 (1): 013037 (2015)A constant-throughput LLL algorithm with deep insertion for LR-aided MIMO detection., , , and . ISCAS, page 1251-1254. IEEE, (2012)Improvements on transducing syllable lattice to word lattice for keyword search., , , and . ICASSP, page 4729-4733. IEEE, (2015)Syllable based keyword search: Transducing syllable lattices to word lattices., , , , and . SLT, page 489-494. IEEE, (2014)ESACW: an adaptive algorithm for transmission power reduction in wireless networks., , and . ISLPED, page 82-85. ACM, (2004)Improved Branch Prediction for Just-in-Time Decompression of Canonical Huffman Bytecode Streams., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 719-729. Springer, (2014)Experimental Research and Capability Valuation on Security of SOA-SCA based SDO., , , and . SECRYPT, page 337-341. INSTICC Press, (2008)An elastic mixed-criticality task model and its scheduling algorithm., and . DATE, page 147-152. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Cognitive Radio Based Multi-Channel MAC Protocols for Wireless Ad Hoc Networks., and . GLOBECOM, page 4857-4861. IEEE, (2007)Forecast the Plausible Paths in Crowd Scenes., , , and . IJCAI, page 2772-2778. ijcai.org, (2017)