Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Hub Number of Sierpiński-Like Graphs., , , and . Theory Comput. Syst., 49 (3): 588-600 (2011)Managing The Risk Of Overusing Mobile Phones In The Working Environment: A Study Of Ubiquitous Technostress., , and . PACIS, page 81. Queensland University of Technology, (2011)Low Power Adders Design for Portable Video Terminal., , and . IIH-MSP, page 651-654. IEEE Computer Society, (2008)An ultra-fast temporary bonding and release process based on thin photolysis polymer in 3D integration., , , , and . 3DIC, page TS8.8.1-TS8.8.5. IEEE, (2015)Computing Global Secure Set on Trees., , and . Comput. J., 59 (5): 616-629 (2016)How does background music tempo work for online shopping?, and . Electronic Commerce Research and Applications, 11 (3): 299-307 (2012)Minimizing the sum of job completion times on capacitated two-parallel machines., , and . European Journal of Operational Research, 197 (2): 475-481 (2009)Makespan minimization for multiple uniform machines., and . Computers & Industrial Engineering, 54 (4): 983-992 (2008)Global Strong Defensive Alliances of Sierpiński-Like Graphs., , and . Theory Comput. Syst., 53 (3): 365-385 (2013)BER Performance of Wireless BPSK Communication System in Tunnels With and Without Traffic., , , and . Wireless Personal Communications, 30 (1): 1-12 (2004)