Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulation of Error Latency and Error Recovery in Concurrent Processing., , and . PDPTA, page 332-338. CSREA Press, (2005)Web Usage Mining with Fine-Grained Browsing Activity Tracking., , and . IKE, page 11-17. CSREA Press, (2010)Selectivity Estimation for Spatial Joins with Geometric Selections., , and . EDBT, volume 2287 of Lecture Notes in Computer Science, page 609-626. Springer, (2002)Force/torque closure grasp in the plane., and . IROS, page 705-710. IEEE, (1991)Towards a Computational Spatial Knowledge Acquisition Model in Architectural Space., , and . CAAD Futures, volume 369 of Communications in Computer and Information Science, page 256-266. Springer, (2013)Text Spotting of Electrical Diagram Based on Improved PP-OCRv3., , and . ICONIP (14), volume 1968 of Communications in Computer and Information Science, page 125-136. Springer, (2023)COFFEE: Cross-Layer Optimization for Fast and Efficient Executions of Sinkhorn-Knopp Algorithm on HPC Systems., , , , and . IEEE Trans. Parallel Distributed Syst., 34 (7): 2167-2179 (July 2023)A New Approach to Detecting Malicious Modification to Streaming Data Using Integer Stuffing., , , and . Security and Management, page 393-399. CSREA Press, (2010)Telepresent Agents: A New Paradigm for Networked Systems., , and . PDPTA, page 1462-1468. CSREA Press, (2004)The Price of Security: A Performance Study of Web Application Security., and . International Conference on Internet Computing, page 97-103. CSREA Press, (2008)