Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Balance Approach for the Internal High Pressure Forming of Tubes, , , and . New Developments in Hydroforming, page 115-126. Fellbach/Stuttgart, Germany, MAT INFO Werkstoff-Informationsgesellschaft mbH, (2014)Energiebilanzierungsansatz für das Innenhochdruck-Umformen von Rohren, , , and . (2014)CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing, , , , and . CoRR, (2012)The Impact of Foreign Reserves Accumulation on Inflation in Vietnam: An ARDL Bounds Testing Approach., , and . ECONVN, volume 809 of Studies in Computational Intelligence, page 765-778. Springer, (2019)The Efficient Sterilization of Central Bank: Suitable Estimation Method., , and . ECONVN, volume 760 of Studies in Computational Intelligence, page 639-647. Springer, (2018)Cirripede: circumvention infrastructure using router redirection with plausible deniability., , , and . ACM Conference on Computer and Communications Security, page 187-200. ACM, (2011)Location-Aware Human Activity Recognition., , , and . ADMA, volume 10604 of Lecture Notes in Computer Science, page 821-835. Springer, (2017)Slick Packets, , , , , and . CoRR, (2012)Slick packets., , , , , and . SIGMETRICS, page 245-256. ACM, (2011)CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing., , , , and . ACM Conference on Computer and Communications Security, page 121-132. ACM, (2012)