Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-angle Evaluations of Test Cases Based on Dynamic Analysis., and . ADMA, volume 8933 of Lecture Notes in Computer Science, page 406-420. Springer, (2014)A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures., , , , and . IEEE Access, (2019)Scheduling performance polymorphic computations in real-time systems., and . COMPSAC, page 406-411. IEEE, (1991)A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks., , , , and . Sensors, 17 (11): 2681 (2017)Sensor bias jump detection and estimation with range only measurements., , and . ICIA, page 1658-1663. IEEE, (2015)A Class of Optimal Frequency Hopping Sequences Based upon the Theory of Power Residues., , , and . SETA, volume 5203 of Lecture Notes in Computer Science, page 188-196. Springer, (2008)Distributed-Log-based Scheme for IP Traceback., , , and . CIT, page 711-715. IEEE Computer Society, (2005)NeRF2Points: Large-Scale Point Cloud Generation From Street Views' Radiance Field Optimization., , , , , , , , , and . CoRR, (2024)Automatic Array Privatization., and . LCPC, volume 768 of Lecture Notes in Computer Science, page 500-521. Springer, (1993)Automatic Detection of Parallelism: A grand challenge for high performance computing., , , , , , and . IEEE Parallel Distributed Technol. Syst. Appl., 2 (3): 37-47 (1994)