Author of the publication

Introduction to Generalized Symbolic Trajectory Evaluation.

, and . ICCD, page 360-367. IEEE Computer Society, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Cultivation of Core Competence Based on Tacit Knowledge., , and . ICEB, page 987-989. Academic Publishers/World Publishing Corporation, (2004)Simple Algorithms for Complex Relation Extraction with Applications to Biomedical IE, , , , , and . Proc. 43rd Annual Meeting of the Association for Computational Linguistics, (2005)Distributed Dynamic Scheduling for Cyber-Physical Production Systems Based on a Multi-Agent System., , , and . IEEE Access, (2018)Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks, , , and . CoRR, (2011)Dynamic HARQ Optimization for Voice over LTE., , , , , and . ICC, page 1-5. IEEE, (2018)Distortion Propagation Based Quantization Parameter Cascading Method for Screen Content Video Coding., , , , and . IEEE Access, (2019)Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks., , , and . Sensors, 16 (7): 1081 (2016)A New Shuffled Frog Leaping Algorithm with Space Zoomed Factor and Gravity Attractor., and . J. Digit. Inf. Manag., 11 (5): 352-358 (2013)DNA Computing Model of the Integer Linear Programming Problem Based on Molecular Beacon., , , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 238-247. Springer, (2006)An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets., , , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 601-611. Springer, (2018)