Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Event Correlation Synchronization Algorithm for MMOG, , , and . Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on, 1, page 746 -751. (July 2007)A Traffic Modeling Method for MMOG., , , , and . SNPD, page 907-911. IEEE Computer Society, (2008)Multi-attack Reference Hashing Generation for Image Authentication., , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 407-420. Springer, (2019)A dithering Technique for Sha_less Pipelined ADC., , , , , and . J. Circuits Syst. Comput., (2014)Reform of Teaching Management Based on the Perspective of "Deep Learning".. CSIA (2), volume 1343 of Advances in Intelligent Systems and Computing, page 594-602. Springer, (2021)Blind Robust Watermarking Mechanism Based on Maxima Curvature of 3D Motion Data., , , and . Information Hiding, volume 7692 of Lecture Notes in Computer Science, page 110-124. Springer, (2012)Path Planning Technologies for Autonomous Underwater Vehicles-A Review., , and . IEEE Access, (2019)An Algorithm of Level of Detail Terrain., , , , and . SNPD, page 912-916. IEEE Computer Society, (2008)Device identification based on H.264 cues., , , , , and . ChinaSIP, page 452-455. IEEE, (2013)A 1.2-GS/s 8-bit two-step SAR ADC in 65-nm CMOS with passive residue transfer., , and . A-SSCC, page 1-4. IEEE, (2015)