Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compression of a Set of Strings., and . DCC, page 390. IEEE Computer Society, (2007)Evaluating Multilayer Multimedia Exploration., , , , , and . SISAP, volume 9371 of Lecture Notes in Computer Science, page 162-169. Springer, (2015)Text Compression: Syllables., and . DATESO, volume 129 of CEUR Workshop Proceedings, page 32-45. CEUR-WS.org, (2005)Compression of a Dictionary., and . DATESO, volume 176 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)An Enhanced Authentication Protocol Suitable for Constrained RFID Systems., , , , , , , , and . IEEE Access, (2024)Task Scheduling Mechanisms for Fog Computing: A Systematic Survey., , , , , , and . IEEE Access, (2023)A New Strong Adversary Model for RFID Authentication Protocols., , , , , , and . IEEE Access, (2020)Suffix Array for Large Alphabet., , and . DCC, page 543. IEEE Computer Society, (2008)Multistream Compression., , , and . DCC, page 527. IEEE Computer Society, (2008)Syllable-based Compression for XML Documents., , and . DATESO, volume 176 of CEUR Workshop Proceedings, CEUR-WS.org, (2006)