Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A multithreaded initial detailed routing algorithm considering global routing guides., , , , and . ICCAD, page 82. ACM, (2018)A DAG-Based Algorithm for Obstacle-Aware Topology-Matching On-Track Bus Routing., , , , and . DAC, page 217. ACM, (2019)A dual-band 802.11abgn/ac transceiver with integrated PA and T/R switch in a digital noise controlled SoC., , , , , , , , , and 7 other author(s). CICC, page 1-8. IEEE, (2015)Understanding Organization Employee's Information Security Omission Behavior: an Integrated Model of Social norm and Deterrence., and . PACIS, page 280. (2014)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Noise-refined image enhancement using multi-objective optimization., , and . CISS, page 1-6. IEEE, (2010)Can addition of noise improve distributed detection performance?, , , and . FUSION, page 1-6. IEEE, (2006)Sensor fusion enhancement via optimized stochastic resonance at local sensors., , , , and . FUSION, page 1-5. IEEE, (2007)Forest height estimation and validation using Tandem-X polinsar., , and . IGARSS, page 1889-1892. IEEE, (2013)Wide area forest height mapping using Tandem-X standard mode data., , , and . IGARSS, page 3782-3785. IEEE, (2015)