Author of the publication

Full Fabrication Simulation of 300mm Wafer Focused on AMHS (Automated Material Handling Systems).

, , , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 514-520. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrimeEye: A Real-Time Face Detection and Recognition System Robust to Illumination Changes., , , and . AVBPA, volume 2091 of Lecture Notes in Computer Science, page 360-365. Springer, (2001)Quality Measurement of Push Services for Smart Devices., , , and . Wireless Personal Communications, 88 (2): 319-336 (2016)RRAM Spare Allocation in Semiconductor Manufacturing for Yield Improvement., and . KES, volume 3215 of Lecture Notes in Computer Science, page 95-102. Springer, (2004)On the Repair of Memory Cells with Spare Rows and Columns for Yield Improvement., , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 713-720. Springer, (2004)Redundancy analysis simulation in semiconductor manufacturing for yield improvement., , and . SpringSim, SCS/ACM, (2009)Full Fabrication Simulation of 300mm Wafer Focused on AMHS (Automated Material Handling Systems)., , , and . AsiaSim, volume 3398 of Lecture Notes in Computer Science, page 514-520. Springer, (2004)Automatic Classification Using Decision Tree and Support Vector Machine., and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1325-1330. Springer, (2005)Automatic Detection of Failure Patterns Using Data Mining., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 1312-1316. Springer, (2005)Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture., , , , and . EUC, page 359-362. IEEE Computer Society, (2010)Collaborative Trust-Based Shortest Secure Path Discovery in Mobile Ad Hoc Networks., , and . International Conference on Computational Science (2), volume 3992 of Lecture Notes in Computer Science, page 1089-1096. Springer, (2006)