Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solving the minimum bisection problem using a biologically inspired computational model., , , and . Theor. Comput. Sci., 411 (6): 888-896 (2010)A control loop approach for integrating the future decentralized power markets and grids., , , , , and . SmartGridComm, page 588-593. IEEE, (2013)Information Entropy Model for Anonymity Measurement., , and . INCoS, page 192-195. IEEE, (2013)Simulation Algorithm for Energy-Efficient Train Control under Moving Block System., , , and . CSIE (5), page 498-502. IEEE Computer Society, (2009)Predicting Target Events in Industrial Domains., , , , , and . MLDM, volume 10358 of Lecture Notes in Computer Science, page 17-31. Springer, (2017)An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption., , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 503-512. Springer, (2017)Using prediction to conserve energy in recognition on mobile devices., , , and . PerCom Workshops, page 364-367. IEEE Computer Society, (2011)A Connectivity Based Partition Approach for Node Scheduling in Sensor Networks., , and . DCOSS, volume 4549 of Lecture Notes in Computer Science, page 354-367. Springer, (2007)Global Peer-to-Peer Classification in Mobile Ad-Hoc Networks: A Requirements Analysis., , , and . CONTEXT, volume 6967 of Lecture Notes in Computer Science, page 108-114. Springer, (2011)Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks., , and . EUC (2), page 10-15. IEEE Computer Society, (2008)978-0-7695-3492-3.