Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network restoration under dual failures using path-protecting preconfigured cycles., , and . Telecommunication Systems, 49 (3): 271-286 (2012)Discovering Functional Communities in Social Media., , , and . ICDM Workshops, page 917-924. IEEE Computer Society, (2015)Centralized multi-scale singular value decomposition for feature construction in LIDAR image classification problems., , , , and . AIPR, page 1-6. IEEE Computer Society, (2012)The topological structure of maximal lattice free convex bodies: The general case., , and . Math. Program., (1998)Application of multi-scale singular vector decomposition to vessel classification in overhead satellite imagery., , , , and . ICDIP, volume 9631 of SPIE Proceedings, page 963108. SPIE, (2015)An Implementation of the Generalized Basis Reduction Algorithm for Integer Programming., , , and . INFORMS J. Comput., 5 (2): 206-212 (1993)Simulating and implementing geospatially-based binding mechanisms for mobile peering., and . AMBI-SYS, page 23. ICST, (2008)TDMA scheduling and channel assignment for cognitive tactical networks., , , , , and . MILCOM, page 1-6. IEEE, (2012)The Topological Structure of Maximal Lattice Free Convex Bodies: The General Case., , and . IPCO, volume 920 of Lecture Notes in Computer Science, page 244-251. Springer, (1995)On Minimizing the Size of Encrypted Databases., and . DBSec, volume 8566 of Lecture Notes in Computer Science, page 364-372. Springer, (2014)