Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliability assessment of power pole infrastructure incorporating deterioration and network maintenance., , , and . Rel. Eng. & Sys. Safety, (2014)Application of Higher Order Cumulants for Seismic Wavelet Reconstruction., , and . Data Science Journal, (2007)Application of spatial visualization for probabilistic hurricanes risk assessment to build environment., and . Winter Simulation Conference, page 1314-1319. WSC, (2008)A Data Reusing Strategy Based on Column-Stores., , , , and . DASC, page 163-168. IEEE Computer Society, (2013)Performance Analysis Mobility Management in Heterogeneous Wireless Networks., , and . AINA, page 677-682. IEEE Computer Society, (2005)A simple reactive algorithm for miniature mobile robot navigation in the unknown environment with static obstacles., , , , , and . ROBIO, page 438-443. IEEE, (2013)Research on Intelligent Control Model of Leveler Based on Multi and Structured Light Detection Method., , , , and . PACIIA (1), page 163-169. IEEE Computer Society, (2008)Research in a Framework of Embedded Network Protocol Stack and Application., , , and . PACIIA (1), page 768-771. IEEE Computer Society, (2008)Research and Application of Signal Mechanism in Remote Embedded Data-Gather System., , , and . PACIIA (1), page 761-767. IEEE Computer Society, (2008)SVEET! a scalable virtualized evaluation environment for TCP., , and . TRIDENTCOM, page 1-10. IEEE Computer Society, (2009)