Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unified Performance Authoring Tool for Heterogeneous Devices and Protocols., , , , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 481-487. Springer, (2012)Color Coding for Massive Bicycle Trajectories., , , and . ICITCS, volume 215 of Lecture Notes in Electrical Engineering, page 509-514. Springer, (2012)Approximation Algorithms for Scheduling Real-Time Multicast Flows in Wireless LANs., , , and . INFOCOM, page 2092-2100. IEEE, (2008)Implementation of a real-time wireless interference alignment network., , , , , and . ACSCC, page 104-108. IEEE, (2012)High throughput MAC layer multicasting over time-varying channels., , , and . Comput. Commun., 32 (1): 94-104 (2009)Automatic Dual Crane Cooperative Path Planning Based on Multiple RRT Algorithm for Narrow Path Finding Scenario., , , and . IEEE Access, (2024)Intelligent Tire Sensor-Based Real-Time Road Surface Classification Using an Artificial Neural Network., , , and . Sensors, 21 (9): 3233 (2021)Deflection routing in 3D network-on-chip with limited vertical bandwidth., , , and . ACM Trans. Design Autom. Electr. Syst., 18 (4): 50:1-50:22 (2013)Personalized Magic Mirror: Interactive Mirror Based on User Behavior., , , and . ICOST, volume 4541 of Lecture Notes in Computer Science, page 162-169. Springer, (2007)V0Finder: Discovering the Correct Origin of Publicly Reported Software Vulnerabilities., , , , and . USENIX Security Symposium, page 3041-3058. USENIX Association, (2021)