Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Petri Net Based Models for Specification and Analysis of Cryptographic Protocols., and . J. Syst. Softw., 37 (2): 141-159 (1997)Vertical silicon nanowires as a universal platform for delivering biomolecules into living cells., , , , , , , , , and 3 other author(s). Proc Natl Acad Sci U S A, 107 (5): 1870--1875 (February 2010)Consideration of Constraints in Communication Terminal Devices Due to an Installed Environment of Sensor Networks., , and . ICUFN, page 820-822. IEEE, (2018)Processing Acceleration of Broadband Wireless MAC in a Portable Terminal., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (6): 1680-1687 (2006)Hierarchy architecture security design for energy cloud., , , , and . ICTC, page 1187-1189. IEEE, (2017)POSCAT: A Morpheme-based Speech Corpus Annotation Tool., , , and . LREC, European Language Resources Association, (2000)Automatic Corpus-based Tone Prediction using K-ToBI Representation., , and . EMNLP, ACL, (2001)Demand Management System for Electric Vehicle Charging Energy and Energy Cloud Operation., , and . ICTC, page 221-223. IEEE, (2022)Extended Role Based Access Control and Procedural Restrictions., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 184-196. Springer, (2003)Optimization mechanism of energy cluster for zero energy town., , , , and . ICTC, page 1121-1123. IEEE, (2017)