Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Computing to Informatics.. DMS, Knowledge Systems Institute, (2010)Multi-scale temporospatial variability of the East Asian Meiyu-Baiu fronts: characterization with a suite of new objective indices, , , and . (2017)Structured Sparse Linear Model for Social Trust Prediction., , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 756-767. Springer, (2014)Non-Malleable Functions and Their Applications., , , , and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 386-416. Springer, (2016)A Self-Configuring Communication Virtual Machine., , and . ICNSC, page 739-744. IEEE, (2008)Design of Cyber Security for Critical Infrastructures: A Case for a Schizoid Design Approach., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 41-54. Springer, (2015)A HyperNet Model for Large Hypertext Systems., and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 484-490. World Scientific, (1991)Magic Adversaries Versus Individual Reduction: Science Wins Either Way.. EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 351-377. (2017)Temporal Logic Inference for Hybrid System Observation with Spatial and Temporal Uncertainties., , and . CoRR, (2020)Unifying Multi-Paradigms in Software System Design., and . SEKE, page 386-393. IEEE Computer Society, (1992)