Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Systems and Sustained Competitive Advantage: A Resource-Based Analysis, , and . Presented at the INFORMS Annual Meeting 2008, Washington, DC., (2008)On equilibrium performance assurance with costly monitoring., , , and . Expert Syst. Appl., (2018)A fast H.264 compressed domain watermarking scheme with minimized propagation error based on macro-block dependency analysis., , , and . ICIP, page 2189-2192. IEEE, (2012)A Transmit Power Control Algorithm for Data Acquisition Systems., , , , , , and . VTC Spring, page 1-5. IEEE, (2012)Code adaptation control algorithm for high energy-efficiency wireless sensor networks., and . IWCMC, page 1227-1231. IEEE, (2011)High capacity reversible data embedding and content authentication.. ICASSP (3), page 517-520. IEEE, (2003)Characterizing information propagation patterns in emergencies: A case study with Yiliang Earthquake., , , and . Int. J. Inf. Manag., 38 (1): 34-41 (2018)Millimeter-Wave Multi-Radar System for Ubiquitous Concealed Dangerous Object Detection., , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1896-1900. IEEE, (2019)Integrating Pre-trained Model into Rule-based Dialogue Management., , , , , , , , , and 2 other author(s). AAAI, page 16097-16099. AAAI Press, (2021)Rapid Mobility of Mobile IP over WLAN., and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 259-267. Springer, (2005)