Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TFP: An Efficient Algorithm for Mining Top-K Frequent Closed Itemsets., , , and . IEEE Trans. Knowl. Data Eng., 17 (5): 652-664 (2005)Condensing operators and topological degree theory in standard fuzzy normed spaces., and . Fuzzy Sets and Systems, 161 (8): 1047-1063 (2010)A Design of Security Module to Protect Program Execution in Embedded System., , , and . GreenCom/iThings/CPScom, page 1750-1755. IEEE, (2013)Iterative Threshold Selection for TOA Estimation of IR-UWB System., , , , , and . GreenCom/iThings/CPScom, page 1763-1766. IEEE, (2013)XPERANTO: Publishing Object-Relational Data as XML., , , , , , and . WebDB (Informal Proceedings), page 105-110. (2000)Real-time scheduling of divisible loads in cluster computing environments., , , , and . J. Parallel Distrib. Comput., 70 (3): 296-308 (2010)A data warehouse based on materializing object-oriented views., , , and . Computers and Their Applications, page 68-71. ISCA, (2000)A tree structure algorithm for joint blind channel estimation and signal detection for downlink MIMO DS-CDMA systems., , and . ISSPA, page 359-362. IEEE, (2005)A Construction Model of Ancient Architecture Protection Domain Ontology based on Software Engineering and CLT., , and . JSW, 9 (11): 2886-2894 (2014)Partitioned multiprocessor scheduling of mixed-criticality parallel jobs., , , and . RTCSA, page 1-10. IEEE Computer Society, (2014)