Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Set of Geometric Invariants for Kinematic Analysis of 6R Manipulators., , and . I. J. Robotic Res., 19 (8): 784-792 (2000)Efficient constructions of certificate-based key encapsulation mechanism., and . IJIPT, 8 (2/3): 96-106 (2014)Climate modelling for agroforestry species selection in Yunnan Province, China., , , , , , , , , and . Environmental Modelling and Software, (2016)Forward-Secure Certificate-Based Encryption and its Generic Construction., and . JNW, 5 (5): 527-534 (2010)Distributed Bayesian Compressive Sensing using Gibbs sampler., , and . WCSP, page 1-5. IEEE, (2012)On design of asymmetric interference alignment and cancelation scheme in MIMO X network., and . WCSP, page 1-5. IEEE, (2011)Computing the Minimum k-Cover of a String., , , , and . Stringology, page 51-64. Department of Computer Science and Engineering, Faculty of Electrical Engineering, Czech Technical University, (2003)Face Recognition in the Wild by Mining Frequent Feature Itemset., , , and . CCPR (2), volume 484 of Communications in Computer and Information Science, page 331-340. Springer, (2014)Outdoor-Indoor Propagation Characteristics of Peer-to-Peer System at 5.25 GHz., , , , and . VTC Fall, page 869-873. IEEE, (2007)Is Wiki a Good Tool Facilitating Team Collaboration in Undergraduate Education?, and . PACIS, page 27. (2015)