Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special section: Security on grids and distributed systems., and . Future Generation Comp. Syst., 23 (6): 774-775 (2007)A Robust and Power-Efficient SoC Implementation in 65 nm., , , , , and . J. Comput. Sci. Technol., 28 (4): 682-688 (2013)A bottom-up model for heterogeneous BitTorrent systems., , and . J. Parallel Distrib. Comput., 73 (8): 1116-1126 (2013)BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data., , and . IEEE Trans. Computers, 58 (12): 1585-1598 (2009)The Design and Implementations of Locality-Aware Approximate Queries in Hybrid Storage Systems., , , and . IEEE Trans. Parallel Distrib. Syst., 26 (11): 3194-3207 (2015)Rotation invariant analysis and orientation estimation method for texture classification based on Radon transform and correlation analysis., , , and . J. Visual Communication and Image Representation, 21 (1): 29-32 (2010)PIVOT: An adaptive information discovery framework for computational grids., , , , and . Inf. Sci., 180 (23): 4543-4556 (2010)Efficient protocol design for dynamic tag population monitoring in large-scale radio frequency identification systems., , , and . Concurrency and Computation: Practice and Experience, 25 (14): 2080-2097 (2013)LOCK: A fast and flexible tag scanning mechanism with handheld readers., , , and . IWQoS, page 360-369. IEEE, (2014)Bounded LSH for Similarity Search in Peer-to-Peer File Systems., , , and . ICPP, page 644-651. IEEE Computer Society, (2008)