Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation., , and . ISPA, page 309-314. IEEE Computer Society, (2009)Training for Physical Tasks in Virtual Environments: Tai Chi., , , , , , , , and . VR, page 87-. IEEE Computer Society, (2003)The MUSART testbed for query-by-humming evaluation., , , , , and . ISMIR, (2003)Hazard analysis for AADL model., , , , and . RTCSA, page 1-10. IEEE Computer Society, (2014)Structure optimization of multi-finger power SiGe HBTs for thermal stability improvement., , , , , and . Microelectronics Reliability, 49 (4): 382-386 (2009)A Simplified Traffic Generating Method for Network Reliability Based on Self-Similar Model., , , and . JCM, 8 (10): 629-636 (2013)Cooperative monitoring BGP among autonomous systems., , and . Security and Communication Networks, 8 (10): 1943-1957 (2015)A Probabilistic Model of Melodic Similarity., , and . ICMC, Michigan Publishing, (2002)Polyphonic Audio Matching for Score Following and Intelligent Audio Editors., and . ICMC, Michigan Publishing, (2003)Reputation Mechanism for Inter-domain Routing Security Management., , and . CIT (2), page 98-103. IEEE Computer Society, (2009)978-0-7695-3836-5.