Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAC-aware routing metrics for the internet of things., , , and . Comput. Commun., (2016)High throughput pipelined FPGA implementation of the new SHA-3 cryptographic hash algorithm., , and . ISCCSP, page 538-541. IEEE, (2014)Price stabilization using buffer stocks, , and . Journal of Economic Dynamics and Control, 32 (4): 1212--1235 (April 2008)Cooperative handoff in wireless networks., , and . PIMRC, page 1-6. IEEE, (2008)Evaluation of localization methods in millimeter-wave wireless systems., , and . CAMAD, page 345-349. IEEE, (2014)Human Object Detection using Very Low Resolution Thermal Cameras for Urban Search and Rescue., , , and . PETRA, page 311-318. ACM, (2017)Real Time Earthquake's Survivor Detection using a Miniaturized LWIR Camera., , , and . PETRA, page 21. ACM, (2016)Dynamic Cross-Layer Association in 802.11-Based Mesh Networks., , , and . INFOCOM, page 2090-2098. IEEE, (2007)On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function., , , , and . SECRYPT, page 270-275. SciTePress, (2012)A template-based methodology for efficient microprocessor and FPGA accelerator co-design., , , , and . ICSAMOS, page 15-22. IEEE, (2012)