Author of the publication

Location management for packet switched services in 3G partnership project networks.

, and . IET Communications, 1 (4): 562-569 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three-Dimensional Quantitative Structure-Activity Relationship Analysis of the New Potent Sulfonylureas Using Comparative Molecular Similarity Indices Analysis., , , , and . Journal of Chemical Information and Computer Sciences, 40 (4): 1002-1009 (2000)Pre- and co-seismic ground deformations of the 1999 Chi-Chi, Taiwan earthquake, measured with SAR interferometry., , , , , and . Computers & Geosciences, 30 (4): 333-343 (2004)An XML-based implementation of manufacturing route sheet documents for context-sensitive and web-based process planning., , , , and . Int. J. Computer Integrated Manufacturing, 21 (6): 647-656 (2008)Spare parts allocation by improved genetic algorithm and Monte Carlo simulation., and . Int. J. Systems Science, 43 (6): 997-1006 (2012)Generalization of a statistical downscaling model to provide local climate change projections for Australia., , and . Environmental Modelling and Software, 24 (3): 341-358 (2009)Erratum to "Polynomial blending in a mesh hole-filling application" Comput. Aided Design 42 (4) (2010) 340-349., , and . Computer-Aided Design, 43 (3): 329 (2011)Neural Network-Based Prediction of cardiovascular Response due to the Gravitational effects., and . Control and Intelligent Systems, (2008)Modeling Excitation and Propagation of Action Potentials across Inhomogeneous Ventricular Tissue., , , and . I. J. Bifurcation and Chaos, 13 (12): 3845-3863 (2003)A process model for concurrent design in manufacturing enterprise information systems., , and . Enterprise IS, 2 (1): 33-46 (2008)Mitigating application layer distributed denial of service attacks via effective trust management., , , and . IET Communications, 4 (16): 1952-1962 (2010)