Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and practical secret key extraction by exploiting channel response., , , and . INFOCOM, page 3048-3056. IEEE, (2013)Development of Control System for Automatic Mechanical Transmission of Battery Electric Bus., , , , and . AICI (2), volume 7003 of Lecture Notes in Computer Science, page 193-200. Springer, (2011)Performing Joint Learning for Passive Intrusion Detection in Pervasive Wireless Environments., , , , and . INFOCOM, page 767-775. IEEE, (2010)Chaos and Swarm Intelligence., and . Intelligent Computing Based on Chaos, 184, (2009)Scheduling Jobs on Computational Grids Using Fuzzy Particle Swarm Algorithm., , , and . KES (2), volume 4252 of Lecture Notes in Computer Science, page 500-507. Springer, (2006)Multi-objective Peer-to-Peer Neighbor-Selection Strategy Using Genetic Algorithm., , , , and . HiPC, volume 4873 of Lecture Notes in Computer Science, page 443-451. Springer, (2007)A fuzzy matching approach for design pattern mining., , , and . J. Intell. Fuzzy Syst., 23 (2-3): 53-60 (2012)A Novel Access Control Strategy for Distributed Data Systems., , , and . J. Digit. Inf. Manag., 8 (5): 291-297 (2010)Long intergenic non-coding RNA detection benefited from integrative modeling of (Epi)genomic data., , and . FSKD, page 735-740. IEEE, (2013)A Real-Time Video-based Eye Tracking Approach for Driver Attention Study., and . Comput. Informatics, 31 (4): 805- (2012)