Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Wireless Sensor Network Gateway Based on Environmental Monitoring., , and . ESIAT (2), page 289-292. IEEE Computer Society, (2009)Design and Implementation of High-Precision Timer in Linux., , and . CSIE (7), page 341-345. IEEE Computer Society, (2009)Locally Affine Invariant Descriptors for Shape Matching and Retrieval., and . IEEE Signal Process. Lett., 17 (9): 803-806 (2010)SAfeDJ: A Crowd-Cloud Codesign Approach to Situation-Aware Music Delivery for Drivers., , , , , , , , , and 1 other author(s). ACM Trans. Multim. Comput. Commun. Appl., 12 (1s): 21:1-21:24 (2015)Semi-Distributed Relay Selection Algorithm for Multi-User Cooperative Wireless Networks., , and . J. Networks, 6 (6): 907-911 (2011)Some new theorems for cyclic contractions in Gb-metric spaces and some applications., , , and . Appl. Math. Comput., (2019)High Accuracy Mobile Robot Positioning Using an External Large Volume Metrology Instrument., , and . DET, volume 66 of Advances in Intelligent and Soft Computing, page 621-630. Springer, (2009)Symmetric quantum fully homomorphic encryption with perfect security.. Quantum Inf. Process., 12 (12): 3675-3687 (2013)Causal Inference in Strategic Performance Measurement Systems and Its Effect on Performance Evaluations: A Laboratory Experiment., , , and . AMCIS, Association for Information Systems, (2015)Block encryption of quantum messages., and . CoRR, (2018)