Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spotlight SAR Processor by using Extended Frequency Scaling., , , and . IGARSS (4), page 629-632. IEEE, (2009)ICN-OMF: A control, management framework for Information-Centric Network testbed., , , and . ICOIN, page 416-417. IEEE Computer Society, (2015)Guest Editorial: Special Issue on Combinatorial Optimization and Applications., and . Algorithmica, 80 (6): 1769-1770 (2018)An Augmented Reality Processor with a Congestion-Aware Network-on-Chip Scheduler., , , , , , , and . IEEE Micro, 34 (6): 31-41 (2014)A Scoring Model for Clothes Matching Using Color Harmony and Texture Analysis., , and . GREC, volume 7423 of Lecture Notes in Computer Science, page 218-227. Springer, (2011)A Progressive Reprocessing Transaction Model for Updating Spatial Data in Mobile Computing Environments., and . W2GIS, volume 3428 of Lecture Notes in Computer Science, page 64-80. Springer, (2004)Social Relation Based Long-Term Vaccine Distribution Planning to Suppress Pandemic., , , , , and . CSoNet, volume 9197 of Lecture Notes in Computer Science, page 26-34. Springer, (2015)Towards developing a trust-based security solution., , , and . SAC, page 2204-2205. ACM, (2009)Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*., , , , , and . ICNC, page 159-163. IEEE, (2019)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , and . MILCOM, page 1242-1247. IEEE, (2015)