Author of the publication

Visualization of a hydro-electric generating unit and its applications.

, , and . SMC, page 2354-2359. IEEE, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secrecy capacity scaling of large-scale cognitive networks., , , , , , and . MobiHoc, page 125-134. ACM, (2014)Visualization of a hydro-electric generating unit and its applications., , and . SMC, page 2354-2359. IEEE, (2003)From Centralized to Decentralized Coded Caching., , and . CoRR, (2018)Reconciling Selfish Routing with Social Good., , , , and . SAGT, volume 10504 of Lecture Notes in Computer Science, page 147-159. Springer, (2017)Towards Designing Personal Health Information Management System Based on Java., and . Mob. Inf. Syst., (2021)Exploring the capabilities of mobile devices in supporting deep learning., , and . SEC, page 127-138. ACM, (2019)A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography., , and . Security and Communication Networks, 5 (12): 1423-1429 (2012)An efficient certificateless proxy signature scheme without pairing., , and . Mathematical and Computer Modelling, 57 (9-10): 2510-2518 (2013)Exploring the Capabilities of Mobile Devices Supporting Deep Learning., , and . HPDC (Posters/Doctoral Consortium), page 17-18. ACM, (2018)KnowledgeNet: Disaggregated and Distributed Training and Serving of Deep Neural Networks., , , and . OpML, page 47-49. USENIX Association, (2019)