Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The MUSART testbed for query-by-humming evaluation., , , , , and . ISMIR, (2003)Training for Physical Tasks in Virtual Environments: Tai Chi., , , , , , , , and . VR, page 87-. IEEE Computer Society, (2003)An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation., , and . ISPA, page 309-314. IEEE Computer Society, (2009)Cooperative monitoring BGP among autonomous systems., , and . Security and Communication Networks, 8 (10): 1943-1957 (2015)Hazard analysis for AADL model., , , , and . RTCSA, page 1-10. IEEE Computer Society, (2014)Dynamic Threshold Scheme Used in Directed Diffusion., , and . ICESS, volume 3820 of Lecture Notes in Computer Science, page 220-229. Springer, (2005)980nm infrared neural stimulation of sciatic nerve enhanced by carbon nanoparticles., , , , , and . NER, page 215-218. IEEE, (2017)Applying role based access control and genetic algorithms to insider threat detection., , and . ACM Southeast Regional Conference, page 790-791. ACM, (2006)Feedback control of stable force output with evoked sEMG based on virtual hand prosthesis., , , , , , , and . CBS, page 48-52. IEEE, (2018)A Simplified Traffic Generating Method for Network Reliability Based on Self-Similar Model., , , and . JCM, 8 (10): 629-636 (2013)