Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Volumetric Object Reconstruction Using the 3-D MRF Model-Based Segmentation., , , and . IEEE Trans. Med. Imaging, 16 (6): 887-892 (1997)In-network processing of the GPU-based real-time DXT compression., , , and . StudentWorkshop@CoNEXT, page 24:1-24:2. ACM, (2011)Active capture of wireless traces: overcome the lack in protocol analysis., , and . WINTECH, page 41-48. ACM, (2008)Automated Inter-Connections for Service Function Chaining in Distributed Cloud., and . CFI, page 5-8. ACM, (2015)Recent advances in online game technology., , , and . SIGGRAPH ASIA (Courses), page 12:1. ACM, (2010)Network-Adaptive QoS Control for Relative Service Differentiation-Aware Video Streaming., , and . MMNS, volume 3754 of Lecture Notes in Computer Science, page 326-337. Springer, (2005)Performance Comparison of Adaptive Mechanisms of Cleaning Module to Overcome Step-Shaped Obstacles on Façades., , , , , and . IEEE Access, (2019)Modeling the pharyngeal anatomical effects on breathing resistance and aerodynamically generated sound., , , , and . Medical Biol. Eng. Comput., 52 (7): 567-577 (2014)UPnP-based QoSagent for QoS-guaranteed streaming service in home networks., , , and . CCNC, page 543-547. IEEE, (2006)Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks., , , , and . IEEE Netw., 30 (6): 22-27 (2016)