Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mask-cost-aware ECO routing∗., , , , , , and . DATE, page 1-4. European Design and Automation Association, (2014)A Mixed-Height Standard Cell Placement Flow for Digital Circuit Blocks*., , , , , , and . DATE, page 328-331. IEEE, (2019)Magnetic field analysis and structure optimization of high speed EEFS machine., , , , and . IECON, page 978-983. IEEE, (2013)An Enhanced Cluster Head Selection of LEACH Based on Power Consumption and Density of Sensor Nodes in Wireless Sensor Networks., , , , and . Wireless Personal Communications, 109 (4): 2277-2287 (2019)Index-based Online Text Classification for SMS Spam Filtering., and . JCP, 5 (6): 844-851 (2010)Color image segmentation using pixel wise support vector machine classification., , and . Pattern Recognition, 44 (4): 777-787 (2011)Routing, wavelength assignment, and spectrum allocation algorithms in transparent flexible optical WDM networks., , , and . Optical Switching and Networking, 9 (3): 191-204 (2012)Online active multi-field learning for efficient email spam filtering., and . Knowl. Inf. Syst., 33 (1): 117-136 (2011)TxQoS: A Contractual Approach for Transaction Management., , and . EDOC, page 327-338. IEEE Computer Society, (2007)Butterfly: Protecting Output Privacy in Stream Mining., and . ICDE, page 1170-1179. IEEE Computer Society, (2008)