Author of the publication

Simulating a Multi-domain RFID System for Replacement Part Tracking.

, , , , and . SECURWARE, page 197-202. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A generalized output pruning algorithm for matrix-vector multiplication and its application to compute pruning discrete cosine transform., , and . IEEE Trans. Signal Processing, 48 (2): 561-563 (2000)Recent advances in intrusion detection systems., and . Computer Networks, 34 (4): 541-545 (2000)Intrusion-detection for incident-response, using a military battlefield-intelligence process., , , , , , and . Computer Networks, 34 (4): 671-697 (2000)Shortest Synchronizing Codewords of A Binary Huffman Equivalent Code., and . ITCC, page 226-231. IEEE Computer Society, (2003)Two-variable modularized fast polynomial transform algorithm for 2-D discrete Fourier transforms., and . IEEE Trans. Circuits Syst. Video Techn., 2 (1): 84-87 (1992)Panel on Intrusion Detection., , , , and . DBSec, volume 171 of IFIP Conference Proceedings, page 227-234. Kluwer, (1999)Normal bases expansion of the discrete cosine transform., , and . IEEE Trans. Signal Processing, 45 (5): 1348-1350 (1997)Comments on 'An FPT algorithm with a modularized structure for computing 2-D cyclic convolutions' by T.K. Truong, et al., and . IEEE Trans. Signal Processing, 39 (5): 1238 (1991)A refined fast 2-D discrete cosine transform algorithm., and . IEEE Trans. Signal Processing, 47 (3): 904-907 (1999)Critical Information Assurance Challenges for Modern Large-Scale Infrastructures.. MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 7-22. Springer, (2005)