Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Prefix Matching of Bounded Strings., , , , and . ALENEX, page 128-140. SIAM, (2003)Detecting and Localizing End-to-End Performance Degradation for Cellular Data Services Based on TCP Loss Ratio and Round Trip Time., , , , , and . IEEE/ACM Trans. Netw., 25 (6): 3709-3722 (2017)Securely outsourcing power grid simulation on cloud., and . ACM Great Lakes Symposium on VLSI, page 225-226. ACM, (2014)Troubleshooting chronic conditions in large IP networks., , , , , , and . CoNEXT, page 2. ACM, (2008)A novel noise reduction method for optical coherence tomography images., , and . CISP-BMEI, page 167-171. IEEE, (2016)An effective method for plate number recognition., , and . Multimedia Tools Appl., 77 (2): 1679-1692 (2018)Input-to-State Stability Analysis of a Class of Interconnected Nonlinear Systems., , and . ICMLC, volume 3930 of Lecture Notes in Computer Science, page 122-132. Springer, (2005)Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming., , and . IEEE Trans. Computers, 65 (1): 216-229 (2016)A Group Mining Method for Big Data on Distributed Vehicle Trajectories in WAN., , , and . IJDSN, (2015)Time-Series Analysis Reveals Intensified Urban Heat Island Effects but without Significant Urban Warming., , and . Remote Sensing, 11 (19): 2229 (2019)