Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extracting music genes for era classification., , , , and . Expert Syst. Appl., 41 (11): 5520-5525 (2014)On 퓁1 Data Fitting and Concave Regularization for Image Recovery., , and . SIAM J. Scientific Computing, (2013)Redundant via insertion under timing constraints., and . ISQED, page 627-633. IEEE, (2011)Approximate Search Engine Optimization for Directory Service., , and . IPDPS, page 242. IEEE Computer Society, (2003)Many-to-One Throughput Capacity of IEEE 802.11 Multihop Wireless Networks., , and . IEEE Trans. Mob. Comput., 8 (4): 514-527 (2009)Driving behaviors analysis based on feature selection and statistical approach: a preliminary study., , , , , , and . The Journal of Supercomputing, 75 (4): 2007-2026 (2019)Analysis of the Queue Service Probability for the EDF Scheduling Algorithm., , and . AINA Workshops, page 960-963. IEEE Computer Society, (2016)SigFree: A Signature-free Buffer Overflow Attack Blocker., and . USENIX Security Symposium, USENIX Association, (2006)Minimal Resource Allocation on CAN Bus Using Radial Basis Function Networks., , , and . ISNN (3), volume 4493 of Lecture Notes in Computer Science, page 998-1005. Springer, (2007)The UML Diagram to VHDL Code Transformation Based on MDA Methodology., and . ICSI (2), volume 7929 of Lecture Notes in Computer Science, page 496-503. Springer, (2013)