Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A misleading active routing attack in mobile ad-hoc networks., , , and . IJSN, 7 (1): 17-29 (2012)Towards language independent acoustic modeling., , , , , , , , , and . ICASSP, page 1029-1032. IEEE, (2000)A Robotics System for Stereotactic Neurosurgery and Its Clinical Application., , , , and . ICRA, page 995-1000. IEEE Computer Society, (1998)Finite-difference time-domain simulation of ground penetrating radar on dispersive, inhomogeneous, and conductive soils., , , , and . IEEE Trans. Geoscience and Remote Sensing, 36 (6): 1928-1937 (1998)New Approach to the Collision Avoidance Problem for a Ship., and . IGTR, 6 (1): 137-155 (2004)On feasibility of launch vehicle designs., , and . Applied Mathematics and Computation, 164 (2): 295-312 (2005)Comments on duality of queues with finite buffer size., and . Oper. Res. Lett., 14 (1): 29-33 (1993)Weighted learning of bidirectional associative memories by global minimization., , and . IEEE Trans. Neural Networks, 3 (6): 1010-1018 (1992)Fabrication and Practical Evaluation of Glove-integrated Passive UHF RFID Tags., , , , , , and . RFID-TA, page 1-5. IEEE, (2018)Segmentation of Ultrasonic Medical Image Based on Wavelet Transform and Mathematical Morphology., and . WAA, page 757-760. World Scientific, (2003)