Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Nature-Inspired Node Deployment Strategy for Connected Confident Information Coverage in Industrial Internet of Things., , , , and . IEEE Internet of Things Journal, 6 (6): 9217-9225 (2019)Application of Canonical Correlation Analysis in Student Score Analysis Based on Data Analysis., , , and . CSEE (4), volume 217 of Communications in Computer and Information Science, page 481-485. Springer, (2011)Sensor placement based on Delaunay triangulation for complete confident information coverage in an area with obstacles., and . IPCCC, page 1-8. IEEE Computer Society, (2015)The Telescience Tools: Version 2.0., , , , , and . e-Science, page 56-63. IEEE Computer Society, (2005)An iterative decomposition method for scatterer reconstruction in R3., and . J. Computational Applied Mathematics, (2015)The Telescience Project: Application to Middleware Interaction Components., , , , and . CBMS, page 543-548. IEEE Computer Society, (2005)Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 123-138. Springer, (2013)XOR-based meaningful visual secret sharing by generalized random grids., , , and . IH&MMSec, page 181-190. ACM, (2013)The Telescience Portal for advanced tomography applications., , , , , , , , , and . J. Parallel Distrib. Comput., 63 (5): 539-550 (2003)A unique collaboration: revitalizing existing standards while preparing for the future., and . IEEE Computer, 52 (1): 62-65 (2019)