Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing Nim and Enumeration of Nim Characteristics.. CoRR, (2020)Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*., , , , , and . ICNC, page 159-163. IEEE, (2019)A longitudinal study of individual differences in the acquisition of new vowel contrasts., , and . J. Phonetics, (2018)Tessellation-enabled shader for a bandwidth-limited 3D graphics engine., , , and . CICC, page 367-370. IEEE, (2008)A 186Mvertices/s 161mW Floating-Point Vertex Processor for Mobile Graphics Systems., , , and . CICC, page 579-582. IEEE, (2007)A New Localized Geometric Routing with Guaranteed Delivery on 3-D Wireless Networks., , , and . ICCCN, page 1-7. IEEE, (2012)A Dominating Set Based Approach to Identify Effective Leader Group of Social Network., , , , and . COCOON, volume 7936 of Lecture Notes in Computer Science, page 841-848. Springer, (2013)Two new multi-path routing algorithms for fault-tolerant communications in smart grid., , , , , and . Ad Hoc Networks, (2014)Privacy aware incentive mechanism to collect mobile data while preventing duplication., , , , , and . MILCOM, page 1242-1247. IEEE, (2015)Shader-based tessellation to save memory bandwidth in a mobile multimedia processor., , , and . Comput. Graph., 33 (5): 625-637 (2009)