Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-agent and Multi-stage Game Analysis of Venture Capital Governance and Management., and . JCAI, page 32-35. IEEE Computer Society, (2009)QoEScope: Adaptive IP service management for heterogeneous enterprise networks., , , , and . IWQoS, page 1-5. IEEE, (2009)Network coding based SVC multicast over broadband wireless networks., , , and . LCN, page 428-435. IEEE Computer Society, (2012)Delay-bounded sink mobility in wireless sensor networks., , , , and . ICC, page 740-744. IEEE, (2012)Scheduling Sinks in Wireless Sensor Networks: Theoretic Analysis and an Optimal Algorithm., , , , , and . ICC, page 1-6. IEEE, (2011)A Kinect based gesture recognition algorithm using GMM and HMM., , , , and . BMEI, page 750-754. IEEE, (2013)Virtual-Machine-based Intrusion Detection on File-aware Block Level Storage., , , and . SBAC-PAD, page 185-192. IEEE Computer Society, (2006)Hybrid Pulling/Pushing for I/O-Efficient Distributed and Iterative Graph Computing., , , , and . SIGMOD Conference, page 479-494. ACM, (2016)Evaluating Probabilistic Spatial-Range Closest Pairs Queries over Uncertain Objects., , , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 602-613. Springer, (2011)DDoS Attacks and Flash Event Detection Based on Flow Characteristics in SDN., , , , and . AVSS, page 1-6. IEEE, (2018)