Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PassApp: My App is My Password!, , , , and . MobileHCI, page 306-315. ACM, (2015)Scalable sequential pattern mining for biological sequences., , and . CIKM, page 178-187. ACM, (2004)Optimal Input Design for Reduction of Parameter Correlations., , and . ICAC, page 1-6. IEEE, (2018)Walking pads: Fast power-supply pad-placement optimization., , , , and . ASP-DAC, page 537-543. IEEE, (2014)An innovative approach for analysing rank deficient covariance matrices., and . ISIT, page 2596-2600. IEEE, (2012)A chain structure Bluetooth scatternet topology formation algorithm and simulations., , and . GLOBECOM, page 5. IEEE, (2005)Management information system of the Yellow River Mouth based on 3S., , , and . Geoinformatics, page 1-4. IEEE, (2010)On the On-Line Weighted k-Taxi Problem., and . ESCAPE, volume 4614 of Lecture Notes in Computer Science, page 152-162. Springer, (2007)On the On-Line k -Taxi Problem with Limited Look Ahead., , and . COCOA, volume 4616 of Lecture Notes in Computer Science, page 72-80. Springer, (2007)Profit Mining: From Patterns to Actions., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 70-87. Springer, (2002)