Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Dynamic Box by Using an Input String., , , , and . MobiSec, volume 971 of Communications in Computer and Information Science, page 17-29. Springer, (2017)Is the collaborative service always superior to the single library service? A project for evaluating the chat reference services in USA. Bibliothek Forschung und Praxis, 30 (3): 353--366 (2006)A Rejection Model Based on Multi-Layer Perceptrons for Mandarin Digit Recognition., , and . J. Comput. Sci. Technol., 17 (2): 196-202 (2002)Technology of Situation Awareness Based on Radar Network in Cyberspace., , and . GreenCom/iThings/CPScom, page 1505-1508. IEEE, (2013)A new context-based procedure for the detection and removal of cloud shadow from moderate-and-high resolution satellite data over land., , , , , and . IGARSS, page 1718-1721. IEEE, (2010)On the Power of Stochastic Automata Networks in Random Environments., and . FCS, page 3-9. CSREA Press, (2008)On the Maximum Weighted Sum-Rate of MIMO Gaussian Broadcast Channels., , and . ICC, page 3664-3668. IEEE, (2008)Understanding the impact of limited channel state information on massive MIMO network performances., , , and . MobiHoc, page 251-260. ACM, (2016)Feature oriented refactoring of legacy applications., , and . ICSE, page 112-121. ACM, (2006)The Expected Value of Imperfect Information to Fuzzy Programming., , , and . ISNN (2), volume 5552 of Lecture Notes in Computer Science, page 80-87. Springer, (2009)