Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ultralow Loss Hollow-Core Conjoined-Tube Negative-Curvature Fiber for Data Transmission., , , , , , , , , and 1 other author(s). OFC, page 1-3. IEEE, (2019)Identification of Dual-Rate Sampled Hammerstein Systems with a Piecewise-Linear Nonlinearity Using the Key Variable Separation Technique., , and . Algorithms, 8 (3): 366-379 (2015)Moderating Role of Online Self-Efficacy in Relation between Learning Strategy and Online Performance., , and . ICCE, volume 151 of Frontiers in Artificial Intelligence and Applications, page 517-520. IOS Press, (2006)Blind Fingerprinting, and . CoRR, (2008)informal publication.Studying on the Awareness Model in Ontological Knowledge Community., , , , , and . AWIC, volume 3528 of Lecture Notes in Computer Science, page 458-463. Springer, (2005)The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study., , , , , and . HCI (13), volume 4562 of Lecture Notes in Computer Science, page 288-296. Springer, (2007)Xor Perfect Phylogeny Haplotyping in Pedigrees., , , , and . ICIC (2), volume 6216 of Lecture Notes in Computer Science, page 27-34. Springer, (2010)A Tabu search algorithm for static routing and wavelength assignment problem., , and . IEEE Communications Letters, 9 (9): 841-843 (2005)Power Allocation and Subcarrier Pairing Algorithm for Regenerative OFDM Relay System., , , and . VTC Spring, page 2727-2731. IEEE, (2007)Steganalysis of block-structured stegotext., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 477-488. SPIE, (2004)