Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares., , , and . IEEE Access, (2019)Hybrid Heuristic for m-Machine No-Wait Flowshops to Minimize Total Completion Time., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 192-203. Springer, (2007)A Knowledge-Based Mathematical Model Formulation System., , and . Commun. ACM, 35 (9): 138-146 (1992)Resource Provisioning for Task-Batch Based Workflows with Deadlines in Public Clouds., , and . IEEE Trans. Cloud Computing, 7 (3): 814-826 (2019)A direct inverse hysteresis model and its application in reluctance actuators., , , , , and . AIM, page 1262-1267. IEEE, (2019)Power Threshold Game for Covert Communication in Relay Networks with an Active Warden., , , , and . WCSP, page 1-6. IEEE, (2019)VIMAC: A Vehicular Information Medium Access Control Protocol for High Reliable and Low Latency Transmissions in VANET., , , , and . WCSP, page 1-6. IEEE, (2019)Magnetically induced deep brain stimulation of neuronal firing for pain relief., , , and . EMBC, page 731-734. IEEE, (2012)An adaptive intelligent method for manufacturing process optimization in steelworks., , and . CSCWD, page 363-368. IEEE, (2013)Elastic and flexible multi-stage task scheduling with deadline-constraint in clouds., and . CSCWD, page 286-291. IEEE, (2016)