Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UnLocIn: Unauthorized location inference on smartphones without being caught., , , , , , , and . PRISMS, page 1-8. IEEE, (2013)Visualizing radiation patterns of antennas., , , and . IEEE Computer Graphics and Applications, 10 (1): 41-49 (1990)Subcarrier Block Power Control for Adaptive Downlink OFDM with Frequency Spreading and Equalization., , and . IEICE Transactions, 89-B (7): 2102-2105 (2006)Measurements of Normal Incidence Reflection Loss as a Function of Temperature at the Water-Castor Oil Interface., , , and . Sensors, 19 (15): 3289 (2019)A Computational Korean Lexical Access Model Using Artificial Neural Network., , , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 693-701. Springer, (2006)A Hybrid Concurrency Control with Deadlock-free Approach.. ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 517-524. Springer, (2003)A Hybrid Certification Protocol Assured At-most-one Re-execution.. PDPTA, page 1774-1779. CSREA Press, (2002)Perceptual Crosstalk Prediction on Autostereoscopic 3D Display., , , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (7): 1450-1463 (2017)