Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the Yield Efficacy of a Defect-Tolerant Embedded Core., , and . DFT, page 30-. IEEE Computer Society, (2000)Vertically Stacked Benes Networks for Crosstalk-Free Permutation., , , and . CW, page 255-260. IEEE Computer Society, (2002)Detecting SYN Flooding Agents under Any Type of IP Spoofing., , and . ICEBE, page 499-505. IEEE Computer Society, (2008)RSS item ranking based on implicit feedback., , and . FSKD, page 2507-2512. IEEE, (2010)A New Scheme to Realize Crosstalk-free Permutations in Optical MINs with Vertical Stacking., , , and . ISPAN, page 341-. IEEE Computer Society, (2002)Delivery Probability of 3D MANETs with Packet Replication., , , , and . NaNA, page 29-34. IEEE, (2016)Overall Blocking Behavior Analysis of General Banyan-Based Optical Switching Networks., , , and . IEEE Trans. Parallel Distrib. Syst., 17 (9): 1037-1047 (2006)Towards Semantic e-Science for Traditional Chinese Medicine., , , , , , , , , and 1 other author(s). BMC Bioinformatics, (2007)Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel., , , , and . IEICE Transactions, 97-B (2): 396-407 (2014)Fair Scheduling for Delay-Sensitive VoIP Traffic., , and . IEICE Transactions, 92-B (10): 3115-3125 (2009)