Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks., , and . VTC Spring, page 26-30. IEEE, (2007)Global/Local Hybrid Learning of Mixture-of-Experts from Labeled and Unlabeled Data., and . HAIS (1), volume 6678 of Lecture Notes in Computer Science, page 452-459. Springer, (2011)Optimal strategy selection of non-player character on real time strategy game using a speciated evolutionary algorithm., , and . CIG, page 75-79. IEEE, (2009)Optimizing Video Delivery for Enhancing User Experience in Wireless Networks.. IEICE Trans. Commun., 100-B (1): 131-139 (2017)Fitness approximation for genetic algorithm using combination of approximation model and fuzzy clustering technique., and . IEEE Congress on Evolutionary Computation, page 1-6. IEEE, (2010)Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANs., , , and . LCN, page 411-417. IEEE Computer Society, (2006)Mobile Intelligent Synthetic Character in Smartphone Using Behavior Selection Network., and . ICDCS Workshops, page 94-97. IEEE Computer Society, (2012)Experimental characterization of interference in OFDMA femtocell networks., , , , and . INFOCOM, page 2956-2960. IEEE, (2012)Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing., , and . SECRYPT, page 474-479. SciTePress, (2017)An intelligent synthetic character for smartphone with Bayesian networks and behavior selection networks., and . Expert Syst. Appl., 39 (12): 11284-11292 (2012)