Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Wire-Sizing Formular Under the Elmore Delay Model., , and . DAC, page 487-490. ACM Press, (1996)Advanced Classification of Coffee Beans with Fatty Acids Profiling to Block Information Loss., , and . Symmetry, 10 (10): 529 (2018)Berry-Esseen bound of wavelet estimators in heteroscedastic regression model with random errors., , and . Int. J. Comput. Math., 96 (4): 821-852 (2019)Topic Modeling over Short Texts by Incorporating Word Embeddings., , , and . CoRR, (2016)Feedback control can make data structure layout randomization more cost-effective under zero-day attacks., , , , and . Cybersecurity, 1 (1): 3 (2018)Study on split delivery open vehicle routing problem within two splits., , and . ICNC-FSKD, page 724-728. IEEE, (2016)Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology., , , and . ICSAI, page 818-822. IEEE, (2018)An iterated local search algorithm for the permutation flowshop problem with total flowtime criterion., , and . Comput. Oper. Res., 36 (5): 1664-1669 (2009)A multi-restart iterated local search algorithm for the permutation flow shop problem minimizing total flow time., , , and . Comput. Oper. Res., 40 (2): 627-632 (2013)PLBP: An effective local binary patterns texture descriptor with pyramid representation., , , and . Pattern Recognit., 44 (10-11): 2502-2515 (2011)