Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Support Service for Distance Learning Curriculum of Information Security., , , and . FECS, page 80-86. CSREA Press, (2009)A bootstrapping approach to entity linkage on the Semantic Web., and . J. Web Semant., (2015)Caption-aided speech detection in videos., , , , and . ICASSP, page 141-144. IEEE, (2008)Chemical waste water filtration monitoring based on electrical capacitance tomography., , , , and . FSKD, page 1893-1897. IEEE, (2015)Eyes Never Lie!: Hand Eye Coordination Patterns Analysis for Text-graph Separation., , , , and . CCHI, page 60-64. ACM, (2017)Modeling and Electrical Simulations of Thin-Film Gated SOI Lateral PIN Photodetectors for High Sensitivity and Speed Performances., , , , and . NCCET, volume 396 of Communications in Computer and Information Science, page 235-243. Springer, (2013)An Buffering Optimization Algorithm for Cooperative Mobile Service., , , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 86-94. Springer, (2016)Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 24-38. Springer, (2013)Less reused filter: improving l2 cache performance via filtering less reused lines., , , and . ICS, page 68-79. ACM, (2009)A Method for Detecting Surface Defects in Insulators Based on RPCA., , , and . ICIG (2), volume 10667 of Lecture Notes in Computer Science, page 163-173. Springer, (2017)