Author of the publication

Development of Automated Generation Algorithm for Skipped Surface in Die Design.

, , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 503-511. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Exploratory Investigation of Factors Affecting Computer Security Incident Response Team Performance., and . AMCIS, page 547. Association for Information Systems, (2004)Selective Distillation of Weakly Annotated GTD for Vision-based Slab Identification System., , , , and . CoRR, (2018)A Mobile Application of Client-Side Personalization Based on WIPI Platform.. CIS, volume 3314 of Lecture Notes in Computer Science, page 903-909. Springer, (2004)Behavior of Au and Pd and the effects of these metals on IMCs in Pd-Au-coated copper wire., , , , , , , , , and 1 other author(s). Microelectron. Reliab., (2018)Development of a Design Supporting System for Press Die of Automobile Panels., , , and . CSCWD (Selected Papers), volume 4402 of Lecture Notes in Computer Science, page 207-216. Springer, (2006)Development of Automated Generation Algorithm for Skipped Surface in Die Design., , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 503-511. Springer, (2006)Protection Against Format String Attacks by Binary Rewriting., , , , , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 303-308. Springer, (2005)Elaborate Monocular Point and Line SLAM With Robust Initialization., and . ICCV, page 1121-1129. IEEE, (2019)Understanding Students' Learning in a Web-based Course Using Mixed-method Approach., , and . AMCIS, page 372. Association for Information Systems, (2004)Kimchi: A Binary Rewriting Defense Against Format String Attacks., , , , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 179-193. Springer, (2005)