Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning for Goal-Directed Actions Using RNNPB: Developmental Change of "What to Imitate"., , and . IEEE Trans. Cognitive and Developmental Systems, 10 (3): 545-556 (2018)Channel-Error and Collision Aware, Secure Multihop Ad Hoc Wireless Networks.. University of Utah, USA, (2008)Active Routing and Forwarding in Active IP Networks.. IWAN, volume 2982 of Lecture Notes in Computer Science, page 58-67. Springer, (2003)Enhancing cellular multicast performance using ad hoc networks., and . WCNC, page 2175-2181. IEEE, (2005)System Level Power-Performance Trade-Offs in Embedded Systems Using Voltage and Frequency Scaling of Off-Chip Buses and Memory., , , , , and . ISSS, page 225-230. ACM / IEEE Computer Society, (2002)A Proof Technique for Liveness Properties of Multifunction Composite Protocols., and . ICNP, page 219-226. IEEE Computer Society, (1998)Reward hierarchical temporal memory., , , , and . IJCNN, page 1-7. IEEE, (2012)Applications of projection based interactive user interface., , , , , and . SIGGRAPH ASIA Posters, page 40. ACM, (2013)Securing Overlay Activities of Peers in Unstructured P2P Networks., and . CIS, volume 4456 of Lecture Notes in Computer Science, page 795-805. Springer, (2006)Secure Source Specific Multicast for Networks Including Mobile Hosts., and . ICCSA (2), volume 2668 of Lecture Notes in Computer Science, page 181-190. Springer, (2003)