Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximating False Hits of Disyllabic Terms in a Chinese Signature File., , and . J. Inf. Sci. Eng., 11 (1): 35-49 (1995)Generalizing the Division Operation on Indefinite Databases., , and . Future Databases, volume 3 of Advanced Database Research and Development Series, page 347-354. World Scientific, Singapore, (1992)An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme., , and . Appl. Math. Comput., 163 (1): 169-178 (2005)On the traffic estimation and engineering of GSM network., , , and . PIMRC, page 1183-1187. (1996)Broadcasting on Incomplete Hypercubes., , and . IEEE Trans. Computers, 42 (11): 1393-1398 (1993)Reaching Fault Diagnosis Agreement under a Hybrid Fault Model., , and . IEEE Trans. Computers, 49 (9): 980-986 (2000)Similarity Retrieval of Iconic Images Based on 2D String Longest Common Subsequence., , and . DASFAA, page 337-341. Dept. of Computer Science, KAIST, P.O. Box 150, ChongRyang, Seoul, 131-650, Korea, (1989)2d random filter and analysis., and . Int. J. Comput. Math., 42 (1-2): 33-45 (1992)Dynamic Multiprocessor Scheduling for Supporting Real-Time Constraints., , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 83-97. Springer, (1997)A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table., and . VLDB, page 245-254. Morgan Kaufmann, (1984)