Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid SVM/HMM architectures for statistical model-based voice activity detection., , , and . IJCNN, page 2875-2878. IEEE, (2014)A Compression Framework for Personal Image Used in Mobile RFID System., and . ICYCS, page 769-774. IEEE Computer Society, (2008)Speech Fragment Decoding Techniques Using Silent Pause Detection., , , , and . CCPR, volume 321 of Communications in Computer and Information Science, page 579-588. Springer, (2012)A design of degree distribution for systematic fountain codes., , , , and . ICON, page 1-5. IEEE, (2013)Suppressing the out-of-band power radiation in multi-carrier systems: A comparative study., and . GLOBECOM, page 1477-1482. IEEE, (2012)QoS-Aware Automatic Service Composition: A Graph View., , , and . J. Comput. Sci. Technol., 26 (5): 837-853 (2011)Adaptive CUSUM procedures with Markovian mean estimation., , and . Computational Statistics & Data Analysis, 52 (9): 4395-4409 (2008)Incentive Compatible Privacy-Preserving Data Analysis., and . IEEE Trans. Knowl. Data Eng., 25 (6): 1323-1335 (2013)Transforming Semi-Honest Protocols to Ensure Accountability., and . ICDM Workshops, page 524-529. IEEE Computer Society, (2006)QoS-aware dynamic spectrum resource allocation scheme in C-RAN based dense femtocell networks., , , , and . WCSP, page 1-6. IEEE, (2015)