Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threat evaluation of enemy air fighters via neural network-based Markov chain modeling., , , , and . Knowl. Based Syst., (2017)Cas-Database: web-based genome-wide guide RNA library design for gene knockout screens using CRISPR-Cas9., , and . Bioinform., 32 (13): 2017-2023 (2016)ReSSD: A Software Layer for Improving the Small Random Write Performance of SSDs., , and . J. Inf. Sci. Eng., 28 (6): 999-1018 (2012)Design and Implementation of Virtual Stream Management for NAND Flash-Based Storage., , and . IEEE Trans. Consumer Electron., 67 (2): 149-157 (2021)Novel frame selection methods for multi-reference motion estimation., , and . DPS, page 1-4. IEEE, (2009)Vibration suppression control of constrained spatial flexible manipulators., , , and . ICRA, page 2831-2837. IEEE, (1997)Study on 3D Print Style in Iris van Herpen Fashion Show Based on Gestalt Theory., and . HCI (25), volume 13326 of Lecture Notes in Computer Science, page 369-386. Springer, (2022)Energy Reduction in Consolidated Servers through Memory-Aware Virtual Machine Scheduling., , , , , and . IEEE Trans. Computers, 60 (4): 552-564 (2011)Proximity-Based Overlay Routing for Service Discovery in Mobile Ad Hoc Networks., , , and . ISCIS, volume 3280 of Lecture Notes in Computer Science, page 176-186. Springer, (2004)Robust skyline extraction algorithm for mountainous images., , and . VISAPP (1), page 253-257. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2007)