Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)Texture analysis using local region contrast., , and . J. Electronic Imaging, 22 (2): 023007 (2013)Reconstructing of two combined on-axis holograms with π/2-phase difference., , and . INDIN, page 746-749. IEEE, (2015)cTrust: Trust Management in Cyclic Mobile Ad Hoc Networks., , and . IEEE Trans. Vehicular Technology, 62 (6): 2792-2806 (2013)A Comparative Prediction Study of Housing Price Index based on Web Search Data - Evidence from Beijing and Lanzhou in China., , , and . DCNET/ICE-B/OPTICS, page 328-335. SciTePress, (2013)High performance IP lookup circuit using DDR SDRAM., , , , and . SoCC, page 371-374. IEEE, (2008)The Design and Implementation of Sugar-cane Intelligence Expert System Based on Eos/Modis Data Inference Model., , , , , , , , and . CCTA, volume 259 of IFIP Advances in Information and Communication Technology, page 1181-1191. Springer, (2007)Number Balancing is as hard as Minkowski's Theorem and Shortest Vector., , , and . CoRR, (2016)On the Bias of Reed-Muller Codes over Odd Prime Fields., , and . CoRR, (2018)Tomographic reconstruction of Cerenkov photons in tissues through approximate message-passing., , , , , and . Medical Imaging: Image Processing, volume 8314 of SPIE Proceedings, page 83143P. SPIE, (2012)