Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A DTD-Dependent XML Data Management System: An Object-Relation Approach., and . IMSA, page 248-253. IASTED/ACTA Press, (2005)Specifying Policies for Service Negotiations of Response Time., , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 250-257. Springer, (2004)ISAR Cross-Range Scaling Using Iterative Processing via Principal Component Analysis and Bisection Algorithm., , , and . IEEE Trans. Signal Process., 64 (15): 3909-3918 (2016)Efficient classification of ISAR images using 2d fourier transform and polar mapping., , , and . IEEE Trans. Aerosp. Electron. Syst., 51 (3): 1726-1736 (2015)Performance of Sparse Recovery Algorithms for the Reconstruction of Radar Images From Incomplete RCS Data., , , and . IEEE Geosci. Remote. Sens. Lett., 12 (4): 860-864 (2015)Older adults' willingness to share their personal and health information when adopting healthcare technology and services., and . Int. J. Medical Informatics, (2019)Cross-Range Scaling Algorithm for ISAR Images Using 2-D Fourier Transform and Polar Mapping., , and . IEEE Trans. Geosci. Remote. Sens., 49 (2): 868-877 (2011)Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS., , , and . Int. J. Networked Distributed Comput., 3 (3): 167-176 (2015)A novel buffer management scheme based on particle swarm optimization for SSD., , , and . J. Supercomput., 74 (1): 141-159 (2018)An Energy-Efficient Key Predistribution Scheme for Secure Wireless Sensor Networks Using Eigenvector., , and . IJDSN, (2013)