Author of the publication

Design and Implementation of a Gigabit Router using Network Processor.

, , , , and . IMSA, page 32-35. IASTED/ACTA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reducing the Far-end Crosstalk Using Advanced Guard Trace in PCB Transmission Lines., , , and . CDES, page 57-59. CSREA Press, (2009)Analytic Models for Peak Current Computation in General Interconnect Circuits., , , and . CDES, page 60-62. CSREA Press, (2009)Constant current charging in series-series compensated non-radiative wireless power link., , , , , and . ISCAS, page 2792-2795. IEEE, (2013)Data forgery detection for vehicle black box., and . ICTC, page 636-637. IEEE, (2014)Injection-depth-locking axial motion guided handheld micro-injector using CP-SSOCT., , , , , , and . EMBC, page 6163-6166. IEEE, (2014)A resource allocation controller for key-value data stores., , , and . NCA, page 281-284. IEEE Computer Society, (2017)Tracing the True Source of an IPv6 Datagram Using Policy Based Management System., , and . APNOMS, volume 4238 of Lecture Notes in Computer Science, page 263-272. Springer, (2006)Robust Audio Watermarking in Wavelet Domain Using Pseudorandom Sequences., , , , and . ACIS-ICIS, page 397-401. IEEE Computer Society, (2005)Customer expectation level in mobile data services., , and . Mobile HCI, page 259-262. ACM, (2005)Development of the dexterous manipulator and the force sensor for Minimally Invasive Surgery., , and . ICARA, page 524-528. IEEE, (2009)