Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-Term Post-Disturbance Forest Recovery in the Greater Yellowstone Ecosystem Analyzed Using Landsat Time Series Stack., , , , , , , and . Remote Sensing, 8 (11): 898 (2016)Distillation of arbitrary single-photon entanglement assisted with polarized Bell states., , , and . Quantum Information Processing, 14 (10): 3693-3710 (2015)Protecting single-photon entanglement with imperfect single-photon source., , , and . Quantum Information Processing, 14 (2): 635-651 (2015)Grid Integration of Intermittent Wind Generation: A Markovian Approach., , , , , , , and . IEEE Trans. Smart Grid, 5 (2): 732-741 (2014)Distributed Group Management in Sensor Networks: Algorithms and Applications to Localization and Tracking., , , , and . Telecommunication Systems, 26 (2-4): 235-251 (2004)Topic-centric and semantic-aware retrieval system for internet of things., , and . Information Fusion, (2015)Recursive least squares-like algorithms for the adaptive second-order lattice notch filter., , , , and . Digital Signal Processing, 18 (3): 291-306 (2008)Independent Component Analysis Using Multilayer Networks., , and . IEEE Signal Process. Lett., 14 (11): 856-859 (2007)Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction., and . Pattern Recognition, 40 (4): 1270-1281 (2007)The Relation on Prefix Hijacking and the Internet Hierarchy., , , , and . IMIS, page 415-420. IEEE Computer Society, (2012)