Author of the publication

Representing Wholes by Structure.

, , , and . ICCS, volume 4068 of Lecture Notes in Computer Science, page 441-454. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mask-cost-aware ECO routing∗., , , , , , and . DATE, page 1-4. European Design and Automation Association, (2014)A Mixed-Height Standard Cell Placement Flow for Digital Circuit Blocks*., , , , , , and . DATE, page 328-331. IEEE, (2019)Magnetic field analysis and structure optimization of high speed EEFS machine., , , , and . IECON, page 978-983. IEEE, (2013)An Enhanced Cluster Head Selection of LEACH Based on Power Consumption and Density of Sensor Nodes in Wireless Sensor Networks., , , , and . Wireless Personal Communications, 109 (4): 2277-2287 (2019)FlowCover: Low-cost flow monitoring scheme in software defined networks., , , and . GLOBECOM, page 1956-1961. IEEE, (2014)Adaptive Nonlinear Control Algorithm for a Self-Balancing Robot., , , , and . IEEE Access, (2020)Categorizing Web Information on Subject with Statistical Language Modeling., , , and . WISE, volume 3306 of Lecture Notes in Computer Science, page 403-408. Springer, (2004)SprintNet: A high performance server-centric network architecture for data centers., , , , , and . ICC, page 4005-4010. IEEE, (2014)Dispersion management and gain flattened a hybrid EDFA/RFA with pumping recycling mechanism., , , , , , , , and . ICUMT, page 1039-1041. IEEE, (2010)Analysis on perfect location spoofing attacks using beamforming., and . INFOCOM, page 2778-2786. IEEE, (2013)