Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel multi-finger layout strategy for GGnMOS ESD protection device., , , and . ASICON, page 275-278. IEEE, (2011)A reference-less all-digital burst-mode CDR with embedded TDC., , , , , and . ASICON, page 1-4. IEEE, (2015)Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram., , and . IH&MMSec, page 29-38. ACM, (2016)Delay-locked loop based frequency quadrupler with wide operating range and fast locking characteristics., , , , and . ISCAS, page 1-4. IEEE, (2016)Joint Resource Allocation and User Association for Heterogeneous Services in Multi-Access Edge Computing Networks., , and . IEEE Access, (2019)Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks., , and . AMT, volume 5820 of Lecture Notes in Computer Science, page 522-528. Springer, (2009)Object Tracking Based on Kernelized Correlation Filter with HOG and Illumination Invariant Features., , and . BDIOT, page 123-127. ACM, (2018)Research on Performance Comprehensive Evaluation of Thermal Power Plant under Low-Carbon Economy.. ICIC (1), volume 7389 of Lecture Notes in Computer Science, page 112-119. Springer, (2012)Closed-Form Symbol Error Rate of Multiantenna Selection System with Multiuser Diversity., and . PIMRC, page 1-5. IEEE, (2007)Trust Extended Dynamic Security Model and Its Application in Network., , , , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 404-415. Springer, (2006)