Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DataMix: Efficient Privacy-Preserving Edge-Cloud Inference., , , , and . ECCV (11), volume 12356 of Lecture Notes in Computer Science, page 578-595. Springer, (2020)An empirical study of industrial real-time wireless mesh network in field deployments., , , , , , and . INDIN, page 612-617. IEEE, (2016)Scanning the Issue., , , , , , , , , and 9 other author(s). Proc. IEEE, 108 (4): 483-484 (2020)Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy., , and . E-Service Intelligence, volume 37 of Studies in Computational Intelligence, Springer, (2007)Bandwidth-efficient deep learning., and . DAC, page 147:1-147:6. ACM, (2018)Real-Time and Reliable Industrial Control Over Wireless LANs: Algorithms, Protocols, and Future Directions., , and . Proc. IEEE, 107 (6): 1027-1052 (2019)Adaptive co-scheduling for periodic application and update transactions in real-time database systems., , , , and . J. Syst. Softw., 85 (8): 1729-1743 (2012)Generate Image Descriptions based on Deep RNN and Memory Cells for Images Features., and . CoRR, (2016)Trained Ternary Quantization., , , and . CoRR, (2016)A Survey of RFID Authentication Protocols Based on Hash-Chain Method, , , and . CoRR, (2010)