Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuously tracking and see-through occlusion based on a new hybrid synthetic aperture imaging model., , , , and . CVPR, page 3409-3416. IEEE Computer Society, (2011)Towards privacy-preserving RFID-based location-based services., , , , and . FSKD, page 2827-2831. IEEE, (2012)Continuous method for solving fixed point problem on square grid by cubic spline boundary.. CISP-BMEI, page 1-6. IEEE, (2017)PYRROS: static task scheduling and code generation for message passing multiprocessors., and . ICS, page 428-437. ACM, (1992)Coupling prefix caching and collective downloads for remote dataset access., , , , , and . ICS, page 229-238. ACM, (2006)Study on Model of Risk Assessment of Standard Operation in Rural Power Network., and . CCTA (3), volume 346 of IFIP Advances in Information and Communication Technology, page 440-444. Springer, (2010)Identifying Genetic Risk Factors via Sparse Group Lasso with Group Graph Structure., , , and . CoRR, (2017)Optimal solutions for a dynamic bandwidth allocation scheme in high-speed networks., and . Telecommun. Syst., 5 (2): 389-412 (1996)Hybrid Indexing for Versioned Document Search with Cluster-based Retrieval., , , , , and . CIKM, page 377-386. ACM, (2016)A Memory Interference Model for Regularly Patterned Multiple Stream Vector Accesses., and . IEEE Trans. Parallel Distributed Syst., 6 (5): 520-530 (1995)