Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tuning Vth Hopping for Aggressive Runtime Leakage Control., , and . J. Low Power Electronics, 6 (3): 447-456 (2010)Dynamic Characteristics of Power Gating During Mode Transition., , and . IEEE Trans. VLSI Syst., 19 (2): 237-249 (2011)Cognitive Weave Pattern Prioritization in Fabric Design: An Application-Oriented Approach., , , and . IJCINI, 6 (1): 72-99 (2012)Automatic thesaurus construction for spam filtering using revised back propagation neural network., and . Expert Syst. Appl., 37 (1): 18-23 (2010)Experimental evaluation of reducing ranging-error based on receive signal strength indication in wireless sensor networks., , , , and . IET Wireless Sensor Systems, 5 (5): 228-234 (2015)Spatial and temporal characteristics of 60-GHz indoor channels., , and . IEEE Journal on Selected Areas in Communications, 20 (3): 620-630 (2002)Advanced characterization of physical properties of coals with different coal structures by nuclear magnetic resonance and X-ray computed tomography., , , and . Computers & Geosciences, (2012)A cross layer approach to the novel distributed scheduling protocol and event-triggered controller design for Cyber Physical Systems., and . LCN, page 232-235. IEEE Computer Society, (2012)Thresher: An Efficient Storage Manager for Copy-on-write Snapshots., and . USENIX Annual Technical Conference, General Track, page 57-70. USENIX, (2006)A novel transcoding algorithm between 3GPP AMR-NB (7.95kbit/s) and ITU-t g.729a (8kbit/s)., and . INTERSPEECH, page 49-52. ISCA, (2008)