Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Avoid Powerful Tampering by Malicious Host., , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 907-915. Springer, (2003)Repairing Reed-Solomon Codes Over GF(2ℓ)., , and . IEEE Communications Letters, 24 (1): 34-37 (2020)The design, control and experiment of a high payload-weight hexapod robot., , , and . ROBIO, page 2431-2436. IEEE, (2014)Efficient multimedia coprocessor with enhanced SIMD engines for exploiting ILP and DLP., , , , and . Parallel Comput., 39 (10): 586-602 (2013)Optimal Rebuilding of Multiple Erasures in MDS Codes., , and . IEEE Trans. Inf. Theory, 63 (2): 1084-1101 (2017)Using an Automated Approach to Explore and Design a High-Efficiency Processor Element for the Multimedia Domain., , , and . CISIS, page 613-618. IEEE Computer Society, (2008)A New Decision Method for Public Opinion Crisis with the Intervention of Risk Perception of the Public., , and . Complex., (2019)RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing., , , , and . Symmetry, 10 (7): 253 (2018)Intrusion Alert Analysis Based on PCA and the LVQ Neural Network., , and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 217-224. Springer, (2006)Customizing computation accelerators for extensible multi-issue processors with effective optimization techniques., , , , and . DAC, page 197-200. ACM, (2008)