Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model-Based API-Call Constraint Checking for Automotive Control Software., , and . APSEC, page 217-224. IEEE Computer Society, (2016)Maximization of Carried Traffic by Prioritizing New Call Attempts in a CDMA Base Station with Finite Receiver Processors., , and . IEICE Trans. Commun., 89-B (6): 1879-1882 (2006)Optimal Source-Power Splitting in Non-Orthogonal Cooperative Relaying Communications., and . IEICE Trans. Commun., 99-B (1): 249-256 (2016)Rate-regulated power control for supporting flexible transmission in future CDMA mobile networks.. IEEE J. Sel. Areas Commun., 17 (5): 968-977 (1999)Numerical Methods for Comparison on Homomorphically Encrypted Numbers., , , , and . IACR Cryptology ePrint Archive, (2019)Greedy Successive Anchorization for Localizing Machine Type Communication Devices., and . Sensors, 16 (12): 2115 (2016)Cooperative primary-secondary transmission using superposition coding and successive interference cancellation., and . ICNC, page 277-281. IEEE Computer Society, (2012)Cost-aware opportunistic DF relaying with power constraints., and . WPMC, page 652-656. IEEE, (2014)Computer Assisted Composition with Recurrent Neural Networks., and . ACML, volume 77 of Proceedings of Machine Learning Research, page 359-374. PMLR, (2017)Threshold based reporting for improving sensing efficiency in cognitive radio systems with multiple cognitive users., and . ICTC, page 694-698. IEEE, (2015)