Author of the publication

Software System Development based on Component Signature Matching.

, , , and . Parallel and Distributed Computing and Networks, page 211-215. IASTED/ACTA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CFD Simulation of a Large-diameter Combined Gas Distributor., , , , , and . SIMULTECH, page 431-437. SciTePress, (2013)Human Flesh Search Engine and Online Privacy., and . Science and Engineering Ethics, 22 (2): 601-604 (2016)Rational design for over-production of desirable microbial metabolites by precision engineering., , , , , , , , and . Antonie van Leeuwenhoek, (Apr 18, 2010)iKey: An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques., , , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 284-295. Springer, (2018)ε-Approximation to data streams in sensor networks., , and . INFOCOM, page 1663-1671. IEEE, (2013)Detecting Top-k Active Inter-Community Jumpers in Dynamic Information Networks., , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 538-546. Springer, (2018)Discovery of Field Functional Dependencies., , , and . ISKE, page 448-455. IEEE, (2015)Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree., , , and . ADMA, volume 4632 of Lecture Notes in Computer Science, page 158-169. Springer, (2007)A Thin, Compact and Maintenance-Free Beacon Transmitter Operating from a 44-lux Photovoltaic Film Harvester., , and . IEICE Trans. Electron., 100-C (6): 584-591 (2017)Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services., , , , , and . IEEE Access, (2017)