Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehension of implicit meanings in social situations involving irony: A functional MRI study., , , , , , , , , and . NeuroImage, 37 (4): 1417-1426 (2007)Multi-AP Multi-Link Aggregation for High Data Rate Real-Time Applications., , and . CCNC, page 1-2. IEEE, (2020)Personality Estimation Based on Weblog Text Classification., and . IEA/AIE (2), volume 6704 of Lecture Notes in Computer Science, page 89-97. Springer, (2011)Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme., , , , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 155-176. Springer, (2023)A Study on Application Category Estimation Method Based on Burst Characteristics of Communication., , , and . CCWC, page 184-190. IEEE, (2022)Real-Time Performance of Bursty Traffic in Hidden Node Problem., , , , and . ICCE, page 1-6. IEEE, (2024)Operation Prediction for Context-Aware User Interfaces of Mobile Phones., , , and . SAINT, page 16-22. IEEE Computer Society, (2009)Dimensioning Dual-Rate Access Links of a Mobile Cellular Network, , and . page 517-526. (1997)A Low Latency Transmission Control for Multi-link WLAN., , and . ICCCN, page 1-6. IEEE, (2020)Demonstration of Multi-Diversity WLAN Supporting Low-latency and Seamless Video Streaming., , and . CCNC, page 937-938. IEEE, (2022)