Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A network security system model based on FPGA., , and . WCNIS, page 455-459. IEEE, (2010)Soft Subdivision Motion Planning for Complex Planar Robots., , and . ESA, volume 112 of LIPIcs, page 73:1-73:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Chaotic Time Series Prediction Based on Local-Region Multi-steps Forecasting Model., , , , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 418-423. Springer, (2004)Efficient Evaluation of XML Path Queries with Automata., , , , and . WAIM, volume 2762 of Lecture Notes in Computer Science, page 116-127. Springer, (2003)Zagreb eccentricity indices of unicyclic graphs., , and . Discret. Appl. Math., (2017)Feature Decomposition Based Saliency Detection in Electron Cryo-Tomograms., , , and . CoRR, (2018)Nodal domain count and vertex bipartiteness., and . Ars Comb., (2018)A Smart Unstaffed Retail Shop Based on Artificial Intelligence and IoT., , , , and . CAMAD, page 1-4. IEEE, (2018)Requirement-Based Data Cube Schema Design., , , , , and . CIKM, page 162-169. ACM, (1999)Multiverse: a next generation data storage for Alembic., , , and . SIGGRAPH Asia Posters, page 15:1. ACM, (2015)