Author of the publication

Trigonometric polynomial uniform B-spline surface with shape parameter.

, , , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 1357-1363. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery., and . IFIP Int. Conf. Digital Forensics, volume 194 of IFIP, page 79-90. Springer, (2005)Formal Modelling and Verification of Spinlocks at Instruction Level., , , , , and . APSEC, page 355-362. IEEE, (2019)A robust group-based key management scheme for wireless sensor networks., and . WCNC, page 1915-1920. IEEE, (2005)A Dynamic Neural Network Approach for Efficient Control of Manipulators., , and . IEEE Trans. Syst. Man Cybern. Syst., 49 (5): 932-941 (2019)Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy., and . SADFE, page 38-45. IEEE, (2020)Shepherd: A lightweight statistical authentication protocol for access control in wireless LANs., , and . Comput. Commun., 28 (14): 1618-1630 (2005)Secure online banking on untrusted computers., , , and . ACM Conference on Computer and Communications Security, page 720-722. ACM, (2010)A testbed for evaluation and analysis of stepping stone attack attribution techniques., , , , , , and . TRIDENTCOM, IEEE, (2006)A Comprehensive and Reliable Feature Attribution Method: Double-sided Remove and Reconstruct (DoRaR)., , , , and . CoRR, (2023)EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network., , , , , and . IEEE Trans. Comput. Soc. Syst., 8 (2): 522-536 (2021)