Author of the publication

Concept of Policy-Based Wide Area Network Management System.

, , , and . ACIS-ICIS, page 253-258. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Linear Recursive Formulas by Detaching Isolated Variables., and . IEICE Trans. Inf. Syst., 78-D (5): 579-585 (1995)Applications of Asymmetric Networks to Bio-Inspired Neural Networks for Motion Detection., , , and . UKCI, volume 513 of Advances in Intelligent Systems and Computing, page 231-244. Springer, (2016)Neural Network Based Photometric Strereo Using Illumination Planning., , , , and . IJCAI, page 1496-1501. Morgan Kaufmann, (1997)Consideration of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet., , and . NBiS, volume 1264 of Advances in Intelligent Systems and Computing, page 140-150. Springer, (2020)Machine Learning Classification to Effort Estimation for Embedded Software Development Projects., , , and . Int. J. Softw. Innov., 5 (4): 19-32 (2017)Data Partition for Text Classification Based on Rough Sets., , and . SNPD, page 382-. ACIS, (2003)Extraction of face region by using characteristics of color space and detection of face direction through an eigenspace., , , and . KES, page 393-396. IEEE, (2000)Load Experiments of the vDACS Scheme in Case of the 600 Connections by 300 Clients., , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 395-407. Springer, (2017)Consideration of Policy Information Decision Processes in the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain., , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 346-360. Springer, (2018)A recursive time estimation algorithm for program traces under resource constraints., , and . SAC, page 635-640. ACM, (1998)