Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaches to Establishing Multicast Overlays., , and . IEEE SCC, page 268-269. IEEE Computer Society, (2005)Visual Cluttering Reduction for Visualizing Large Spatio-temporal Data Sets., , and . CSE, page 137-143. IEEE Computer Society, (2014)A 2.3mW 10-bit 170MS/s two-step binary-search assisted time-interleaved SAR ADC., , , , , and . CICC, page 1-4. IEEE, (2012)Security analysis for Rayleigh fading channel by artificial noise., , , and . WCSP, page 1-6. IEEE, (2014)Cachecast Networks and its Proxy Placement., , and . Computers and Their Applications, page 374-377. ISCA, (2004)Models of Dry Matter Production and Yield Formation for the Protected Tomato., , , , and . CCTA (1), volume 368 of IFIP Advances in Information and Communication Technology, page 278-292. Springer, (2011)Development of a Model-based Digital and Visual Wheat Growth System., , , and . CCTA, volume 259 of IFIP Advances in Information and Communication Technology, page 1113-1120. Springer, (2007)Understanding the Impact of Interference on Collaborative Relays., and . IEEE Trans. Mob. Comput., 7 (6): 724-736 (2008)Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware., , , , and . IEEE Trans. Information Forensics and Security, 10 (11): 2270-2283 (2015)The Degrees of Freedom of Isotropic MIMO Interference Channels Without State Information at the Transmitters., and . IEEE Trans. Information Theory, 58 (1): 341-352 (2012)