Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A proposal on RFID data analytics methods., , , , and . IOT, IEEE, (2010)Generalized Handling of User-Specific Data in Networked RFID., , , and . IOT, volume 4952 of Lecture Notes in Computer Science, page 173-183. Springer, (2008)Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings., , , and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 95-109. Springer, (1998)Character Segmentation for Mixed-Mode Communication., , and . IFIP Congress, page 681-685. North-Holland/IFIP, (1983)SIR Weighting Combining Diversity Using Matched Filter for Personal Communication Systems., , and . Wireless Personal Communications, 15 (3): 181-197 (2000)New Threshold Setting Method for the Extraction of Facial Areas and the Recognition of Facial Expressions., , , and . CCECE, page 1984-1987. IEEE, (2006)Multiple Use Case Analysis of an AI Hospital Using the AIDAF and Intelligence Amplification Design Canvas., , , , , and . EDOC Workshops, volume 498 of Lecture Notes in Business Information Processing, page 5-22. Springer, (2023)A Frequency Domain Scheduling for Uplink Single Carrier Non-Orthogonal Multiple Access with Iterative Interference Cancellation., , , , , and . VTC Fall, page 1-5. IEEE, (2014)Accessible TV based on the W3C MMI Architecture., , and . GCCE, page 157-158. IEEE, (2014)Fabchain: Managing Audit-able 3D Print Job over Blockchain., , , , , and . ICBC, page 1-3. IEEE, (2022)