Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Analysis of Rate Limiting + Leap Ahead (RL+LA) Countermeasure against Witty Worm., and . CIT/IUCC/DASC/PICom, page 2055-2061. IEEE, (2015)An FPGA-based high-performance wireless vibration analyzer., and . NORCHIP, page 1-5. IEEE, (2013)Process warehouses in practice: a goal-driven method for business process analysis., and . Journal of Software: Evolution and Process, 24 (3): 321-339 (2012)Covert Communications with A Full-Duplex Receiver over Wireless Fading Channels., , , , , and . CoRR, (2017)Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels., , , , , and . ICC, page 1-6. IEEE, (2018)Violent material detection system., , , , , and . ICFNDS, page 56:1-56:3. ACM, (2018)Utilizing Customer Feedback for Business Process Performance Analysis., , , and . BIR, volume 330 of Lecture Notes in Business Information Processing, page 235-249. Springer, (2018)Covert Communication in Backscatter Radio., and . ICC, page 1-6. IEEE, (2019)Process Matching: Performance Trade-Off Between Summary and Full-Length Descriptions., , , , and . Comput. Informatics, 38 (4): 851-882 (2019)Relaying via Cooperative Jamming in Covert Wireless Communications.. ICSPCS, page 1-6. IEEE, (2018)