Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Third-Party Broker-Based Resource Management in Mobile Computing., , , and . JACIII, 20 (2): 262-270 (2016)Using Real-Time Fear Appeals to Improve Social Media Security., and . COMPSAC Workshops, page 610-611. IEEE Computer Society, (2016)Static Mining and Dynamic Taint for Mobile Security Threats Analysis., , , , and . SmartCloud, page 234-240. IEEE Computer Society, (2016)Naive Bayes classification algorithm based on small sample set., and . CCIS, page 34-39. IEEE, (2011)Design and implementation of clock network for nanometer FPGA., and . IEICE Electronic Express, 12 (5): 20141180 (2015)High Speed Comparator for the Moduli 2n, 2n-1, 2n+1., , , , and . IEICE Electronic Express, 10 (21): 20130628 (2013)High-speed modulo (2n+3) multipliers., , and . IEICE Electronic Express, 10 (15): 20130157 (2013)Modified Booth encoding modulo (2n-1) multipliers., , and . IEICE Electronic Express, 9 (5): 352-358 (2012)Booth encoding modulo (2n - 2p - 1) multipliers., , , and . IEICE Electronic Express, 11 (15): 20140588 (2014)Modeling and broadening temporal user interest in personalized news recommendation., , , and . Expert Syst. Appl., 41 (7): 3168-3177 (2014)