Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test cases generation from UML state diagrams., , , and . IEE Proc. Softw., 146 (4): 187-192 (1999)Ultra-Wideband Fermi Antenna Using Microstrip-to-CPS Balun., , , and . IEICE Trans. Commun., 93-B (8): 2219-2222 (2010)Exploiting Attribute-Wise Distribution of Keywords and Category Dependent Attributes for E-Catalog Classification., , , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 985-992. Springer, (2008)Modified Naïve Bayes Classifier for E-Catalog Classification., , , and . DEECS, volume 4055 of Lecture Notes in Computer Science, page 246-257. Springer, (2006)Automatic Tip Detection of Surgical Instruments in Biportal Endoscopic Spine Surgery., , , , and . CoRR, (2019)BestChoice SRM: a simple and practical supplier relationship management system for e-procurement., , , , and . DEECS, volume 236 of ACM International Conference Proceeding Series, page 5-11. ACM, (2007)Identification of Dynamic Load Model Parameters Using Particle Swarm Optimization., , and . Int. J. Fuzzy Log. Intell. Syst., 10 (2): 128-133 (2010)Designing Test Methods for IT-Enabled Energy Storage System to Evaluate Energy Dynamics., , and . J. Inf. Process. Syst., 13 (6): 1487-1495 (2017)Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks., , and . STA, volume 186 of Communications in Computer and Information Science, page 157-163. Springer, (2011)A Safe and Quick Partially-Encrypted Handover Method., , and . NCM, page 2072-2078. IEEE Computer Society, (2009)