Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survivability evaluation index systems and evaluation models for Wireless Sensor Networks., , , , and . FSKD, page 2203-2207. IEEE, (2015)A Gabor Filter Based Fingerprint Enhancement Scheme Using Average Frequency., , , and . IJPRAI, 20 (3): 417-430 (2006)Exploring the optimal substream scheduling and distribution mechanism for data-driven P2P media streaming., , , and . Computer Communications, (2014)Defending DDoS attacks in software defined networking based on improved Shiryaev-Roberts detection algorithm., , , and . J. High Speed Networks, 21 (4): 285-298 (2015)Modal Policy Management Framework for Management of Distributed Systems., , , and . ICNSC, page 1753-1757. IEEE, (2008)Mathematical Model for Multi-physical Process Coupling Analysis of Strip Hot Rolling., , , and . CSO (1), page 245-248. IEEE Computer Society, (2009)A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems., , , and . 3PGCIC, page 463-468. IEEE Computer Society, (2014)Fingerprint matching based on global alignment of multiple reference minutiae., , and . Pattern Recognition, 38 (10): 1685-1694 (2005)On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite., , , and . ICYCS, page 791-796. IEEE Computer Society, (2008)A Novel Scheme for Improving Quality of Service of Live Streaming., , , , and . Informatica (Slovenia), (2015)