Author of the publication

Using rfid and real-time virtual reality simulation for optimization in steel construction.

, , and . ITcon, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks., , , and . Ad Hoc & Sensor Wireless Networks, 17 (1-2): 87-102 (2012)Black hole search in computer networks: State-of-the-art, challenges and future directions., , , , and . J. Parallel Distrib. Comput., (2016)An Enhanced SYN Cookie Defence Method for TCP DDoS Attack., , and . JNW, 6 (8): 1206-1213 (2011)Sentiment analysis of Chinese microblogging based on sentiment ontology: a case study of '7.23 Wenzhou Train Collision'., , and . Connect. Sci., 25 (4): 161-178 (2013)Dataflow-Based Scheduling for Scientific Workflows in HPC with Storage Constraints., and . Comput. J., 58 (7): 1628-1644 (2015)A regular scalable fault tolerant interconnection network for distributed processing., and . Parallel Computing, 27 (14): 1897-1919 (2001)Distributed jamming for secure communication in poisson fields of legitimate nodes and eavesdroppers., and . ACSCC, page 1881-1885. IEEE, (2012)Scenario-Based Validation: Beyond the User Requirements Notation., , and . Australian Software Engineering Conference, page 75-84. IEEE Computer Society, (2010)DCP: Improving the Throughput of Asynchronous Pipeline by Dual Control Path., , , , , , and . HPCC/EUC, page 230-237. IEEE, (2013)Escaping from Blocking: A Dynamic Virtual Channel for Pipelined Routers., , , and . CISIS, page 795-800. (2008)