Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Similarity Retrieval of Iconic Images Based on 2D String Longest Common Subsequence., , and . DASFAA, page 337-341. Dept. of Computer Science, KAIST, P.O. Box 150, ChongRyang, Seoul, 131-650, Korea, (1989)Business Agent., , , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 449-457. Springer, (2002)An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme., , and . Appl. Math. Comput., 163 (1): 169-178 (2005)A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table., and . VLDB, page 245-254. Morgan Kaufmann, (1984)Concurrent operations in linear hashing., , and . Inf. Sci., 51 (2): 193-211 (1990)Broadcasting on Incomplete Hypercubes., , and . IEEE Trans. Computers, 42 (11): 1393-1398 (1993)Reaching Fault Diagnosis Agreement under a Hybrid Fault Model., , and . IEEE Trans. Computers, 49 (9): 980-986 (2000)On the traffic estimation and engineering of GSM network., , , and . PIMRC, page 1183-1187. (1996)Integrated Business Agents for Processing Free Text Information., , and . J. Inf. Sci. Eng., 20 (2): 325-347 (2004)The Design and Implementation of an Easy-to-Use Object-Oriented Database., and . J. Inf. Sci. Eng., 13 (1): 29-61 (1997)