Author of the publication

MetaNet: A Distributed Network Management System for Information Delivery and Planning with Quality of Service Guarantees.

, , , , , and . DSOM, volume 1960 of Lecture Notes in Computer Science, page 205-217. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 16Gb LPDDR4X SDRAM with an NBTI-tolerant circuit solution, an SWD PMOS GIDL reduction technique, an adaptive gear-down scheme and a metastable-free DQS aligner in a 10nm class DRAM process., , , , , , , , , and 37 other author(s). ISSCC, page 206-208. IEEE, (2018)An architecture of scalable ATM switching system and its performance., , , , and . Telecommun. Syst., 14 (1-4): 269-290 (2000)A Remote Firmware Upgrade Method of NAN and HAN Devices to Support AMI's Energy Services., , , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 303-310. Springer, (2011)Lifetime-configurable soft robots via photodegradable silicone elastomer composites., , , , , , , , , and 1 other author(s). CoRR, (2023)Stateful In-Memory Logic System and Its Practical Implementation in a TaO x -Based Bipolar-Type Memristive Crossbar Array., , , , , , , , and . Adv. Intell. Syst., 2 (3): 1900156 (2020)Uplink Power Control Scheme for Reliable Feedback Signalling in HSDPA., , , and . CDMA International Conference, volume 2524 of Lecture Notes in Computer Science, page 41-50. Springer, (2002)Attack Algorithm for a Keystore-Based Secret Key Generation Method., , , and . Entropy, 21 (2): 212 (2019)JNPU: A 1.04TFLOPS Joint-DNN Training Processor with Speculative Cyclic Quantization and Triple Heterogeneity on Microarchitecture / Precision / Dataflow., , , , and . ESSCIRC, page 349-352. IEEE, (2023)Dynamic channel reservation based on mobility in wireless ATM networks., , , , and . IEEE Communications Magazine, 37 (11): 47-51 (1999)A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments., , , , , and . PARA, volume 3732 of Lecture Notes in Computer Science, page 974-982. Springer, (2004)