Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic thesaurus construction for spam filtering using revised back propagation neural network., and . Expert Syst. Appl., 37 (1): 18-23 (2010)Tuning Vth Hopping for Aggressive Runtime Leakage Control., , and . J. Low Power Electronics, 6 (3): 447-456 (2010)Dynamic Characteristics of Power Gating During Mode Transition., , and . IEEE Trans. VLSI Syst., 19 (2): 237-249 (2011)Cognitive Weave Pattern Prioritization in Fabric Design: An Application-Oriented Approach., , , and . IJCINI, 6 (1): 72-99 (2012)Thresher: An Efficient Storage Manager for Copy-on-write Snapshots., and . USENIX Annual Technical Conference, General Track, page 57-70. USENIX, (2006)Near optimal event-based control of nonlinear discrete time systems in affine form with measured input and output data., , and . IJCNN, page 3671-3676. IEEE, (2014)A novel transcoding algorithm between 3GPP AMR-NB (7.95kbit/s) and ITU-t g.729a (8kbit/s)., and . INTERSPEECH, page 49-52. ISCA, (2008)A cross layer approach to the novel distributed scheduling protocol and event-triggered controller design for Cyber Physical Systems., and . LCN, page 232-235. IEEE Computer Society, (2012)Advanced downlink MU-MIMO receiver based on modulation classification., , , , and . GLOBECOM Workshops, page 995-1000. IEEE, (2014)The Building of E-Commerce Transaction Network Based on Multi-agent and CAS Theory., , and . APWCS, page 295-298. IEEE Computer Society, (2010)