Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An extended GEDM method with heterogeneous reference points of decision makers and a new hesitant fuzzy distance formula., , and . Comput. Ind. Eng., (2020)A Review on Cognitive Neuroscience in Information Security Behavior., , , and . WHICEB, page 24. Association for Information Systems, (2019)Robust AM-MIMO based on minimized transmission power., , and . IEEE Communications Letters, 10 (6): 432-434 (2006)Construction of a Collaborative Value Chain in Cloud Computing Environment., , and . PACIS, page 361. (2014)Using an Automated Approach to Explore and Design a High-Efficiency Processor Element for the Multimedia Domain., , , and . CISIS, page 613-618. IEEE Computer Society, (2008)Avoid Powerful Tampering by Malicious Host., , , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 907-915. Springer, (2003)The design, control and experiment of a high payload-weight hexapod robot., , , and . ROBIO, page 2431-2436. IEEE, (2014)Repairing Reed-Solomon Codes Over GF(2ℓ)., , and . IEEE Communications Letters, 24 (1): 34-37 (2020)Efficient multimedia coprocessor with enhanced SIMD engines for exploiting ILP and DLP., , , , and . Parallel Comput., 39 (10): 586-602 (2013)Optimal Rebuilding of Multiple Erasures in MDS Codes., , and . IEEE Trans. Inf. Theory, 63 (2): 1084-1101 (2017)