Author of the publication

A 3-D real-time simulation for autonomous driving with V2V communications.

, , and . ICCVE, page 800-801. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb 1.2V 3.2Gb/s/pin DDR4 SDRAM with improved power distribution and repair strategy., , , , , , , , , and 15 other author(s). ISSCC, page 212-214. IEEE, (2018)Route Optimization with Additional Destination-Information in Mobile Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 286-295. Springer, (2007)I know the shortened URLs you clicked on Twitter: inference attack using public click analytics and Twitter metadata., , and . WWW, page 1191-1200. International World Wide Web Conferences Steering Committee / ACM, (2013)Leaking Uninitialized Secure Enclave Memory via Structure Padding (Extended Abstract)., and . CoRR, (2017)Four-bar linkage-based tool changing mechanism and torque compensation based on dynamic characteristics., , , and . URAI, page 326-327. IEEE, (2016)Redistributing time-based rights between consumer devices for content sharing in DRM system., , and . Int. J. Inf. Sec., 8 (4): 263-273 (2009)Tree-based modeling of prosodic phrasing and segmental duration for Korean TTS systems., and . Speech Commun., 28 (4): 283-300 (1999)BoreholeAR: A mobile tablet application for effective borehole database visualization using an augmented reality technology., , and . Comput. Geosci., (2015)Two Alternative Registration and Paging Schemes for Supporting Idle Mode in IEEE 802.16e Wireless MAN., , , , and . VTC Fall, page 1-5. IEEE, (2006)WarningBird: A Near Real-Time Detection System for Suspicious URLs in Twitter Stream., and . IEEE Trans. Dependable Secur. Comput., 10 (3): 183-195 (2013)