Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing more information in gray visual cryptography scheme., , , , and . J. Visual Communication and Image Representation, 24 (8): 1380-1393 (2013)A cross-layer algorithm of packet scheduling and resource allocation for multi-user wireless video transmission., , , and . IEEE Trans. Consumer Electronics, 57 (3): 1128-1134 (2011)A novel hybrid method for mobile robot path planning in unknown dynamic environment based on hybrid DSm model grid map., , and . J. Exp. Theor. Artif. Intell., 23 (1): 5-22 (2011)An alignment-free fingerprint cryptosystem based on fuzzy vault scheme., , , , , and . J. Network and Computer Applications, 33 (3): 207-220 (2010)Selection of project delivery approach with unascertained model., , and . Kybernetes, 44 (2): 238-252 (2015)Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach., , , and . Sig. Proc.: Image Comm., (2015)Fine-grained resource allocation for cooperative device-to-device communication in cellular networks., , , and . IEEE Wireless Commun., 21 (5): 35-40 (2014)Guest Editorial Special Section on PAR-CAD: Parallel CAD Algorithms and CAD for Parallel Architectures/Systems., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 31 (1): 7-8 (2012)Locality-Driven Parallel Power Grid Optimization., and . IEEE Trans. on CAD of Integrated Circuits and Systems, 28 (8): 1190-1200 (2009)CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding., , , and . INFOCOM, page 100-108. IEEE, (2012)