Author of the publication

Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems.

, , and . Inf. Syst. Frontiers, 13 (4): 471-480 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks., , and . STA, volume 186 of Communications in Computer and Information Science, page 157-163. Springer, (2011)On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems., , and . ICHIT, volume 4413 of Lecture Notes in Computer Science, page 596-606. Springer, (2006)Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors., , , and . IEEE Intelligent Systems, 25 (2): 20-30 (2010)Memory ECC architecutre utilizing memory column spares., and . ISOCC, page 359-360. IEEE, (2016)A secure-coding and vulnerability check system based on smart-fuzzing and exploit., and . Neurocomputing, (2017)Guest Editorial: Technologies and Applications for Interactive NUX/NUI., , , and . Multimedia Tools Appl., 75 (23): 15151-15156 (2016)SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook., , and . Appl. Soft Comput., (2018)Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data., , and . Symmetry, 9 (1): 1 (2017)Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World., , and . Symmetry, 8 (10): 106 (2016)Telling Computer and Human Apart: Image-Sound Based CAPTCHA System., , , and . MUE/FutureTech, volume 448 of Lecture Notes in Electrical Engineering, page 733-736. (2017)