Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Normalized Cross-Correlation enhanced floating car data estimation., , and . WOCC, page 1-6. IEEE, (2011)Service Differentiation in OFDM-Based IEEE 802.16 Networks., , , , , and . EURASIP J. Wireless Comm. and Networking, (2009)ARUM: Polar-Coded HARQ Scheme Based on Incremental Channel Polarization., , , , , and . IEEE Communications Letters, 22 (12): 2519-2522 (2018)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)Planning with Task-Oriented Knowledge Acquisition for a Service Robot., , and . IJCAI, page 812-818. IJCAI/AAAI Press, (2016)Study on the Software Collaboration Framework Based on Internetware., and . Computer and Information Science, 3 (2): 180-190 (2010)Unauthorized Cross-App Resource Access on MAC OS X and iOS., , , , , , , and . CoRR, (2015)A statistical-feature-based approach to internet traffic classification using Machine Learning., , , , and . ICUMT, page 1-6. IEEE, (2009)A novel scene text detection algorithm based on convolutional neural network., , , , , and . VCIP, page 1-4. IEEE, (2016)Optimal Path Planning for Minimizing Disturbance of Space Robot., , and . ICARCV, page 1-6. IEEE, (2006)