Author of the publication

Energy efficiency measurement for multimedia audio decoding on embedded systems.

, , , , and . ICUIMC, page 404-408. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy efficiency measurement for multimedia audio decoding on embedded systems., , , , and . ICUIMC, page 404-408. ACM, (2008)Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks., , and . BWCCA, page 468-471. IEEE, (2012)Threshold signature schemes with traceable signers in group communications., , and . Comput. Commun., 21 (8): 771-776 (1998)Hierarchical key assignment without public-key cryptography.. Comput. Secur., 20 (7): 612-619 (2001)Counteract SYN flooding using second chance packet filtering., , , , and . ICUIMC, page 216-220. ACM, (2009)A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 816-825. Springer, (2006)Binary Document Images Authentication by Thinning Digital Patterns., , , and . IIH-MSP, page 485-488. IEEE Computer Society, (2007)Generalized secure hash algorithm: SHA-X., , , , and . EUROCON, page 1-4. IEEE, (2011)An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks., , , and . IIH-MSP, page 1371-1374. IEEE Computer Society, (2008)A Conference Key Distribution Scheme Using Interpolating Polynomials., , and . MUE, page 963-967. IEEE Computer Society, (2007)