Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gather/scatter hardware support for accelerating Fast Fourier Transform., , and . Journal of Systems Architecture - Embedded Systems Design, 56 (12): 667-684 (2010)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , and . Computer Communications, 28 (14): 1618-1630 (2005)PeerCredential: a reputation-based trust framework for Peer-to-Peer applications., , and . IJICS, 1 (3): 256-277 (2007)A dynamic en-route filtering scheme for data reporting in wireless sensor networks., and . IEEE/ACM Trans. Netw., 18 (1): 150-163 (2010)A Space Reuse Strategy for Flash Translation Layers in SLC NAND Flash Memory Storage Systems., , , , and . IEEE Trans. VLSI Syst., 20 (6): 1094-1107 (2012)Monaural speech separation based on MAXVQ and CASA for robust speech recognition., , , , and . Computer Speech & Language, 24 (1): 30-44 (2010)A testbed for evaluation and analysis of stepping stone attack attribution techniques., , , , , , and . TRIDENTCOM, IEEE, (2006)Monitoring Traffic Activity Graphs with low-rank matrix approximation., , and . LCN, page 59-67. IEEE Computer Society, (2012)Formal verification of a collision-free algorithm of dual-arm robot in HOL4., , , , , and . ICRA, page 1380-1385. IEEE, (2014)Improving performance of text-independent speaker identification by utilizing contextual principal curves filtering., , , and . INTERSPEECH, ISCA, (2004)