From post

Parallel-Machine Scheduling with Step-Deteriorating Jobs to Minimize the Total (Weighted) Completion Time.

, , , , и . Asia Pac. J. Oper. Res., 40 (1): 2240011:1-2240011:13 (февраля 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005., , , , и . ProvSec, том 5324 из Lecture Notes in Computer Science, стр. 176-184. Springer, (2008)Forward Secure Threshold Signature Scheme from Bilinear Pairings., , и . CIS, том 4456 из Lecture Notes in Computer Science, стр. 587-597. Springer, (2006)P3: Joint optimization of charger placement and power allocation for wireless power transfer., , , , и . INFOCOM, стр. 2344-2352. IEEE, (2015)DietCam: Automatic dietary assessment with mobile camera phones., и . Pervasive Mob. Comput., 8 (1): 147-163 (2012)DietCam: Multi-view regular shape food recognition with a camera phone., , , и . Pervasive Mob. Comput., (2015)Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures., , , , и . J. Commun., 3 (7): 36-43 (2008)A Security Reputation Model for IoT Health Data Using S-AlexNet and Dynamic Game Theory in Cloud Computing Environment., , , , и . IEEE Access, (2019)Intrusion-resilient identity-based signature: Security definition and construction., , , , и . J. Syst. Softw., 85 (2): 382-391 (2012)Privacy-Preserving Convolution Neural Network Inference with Edge-assistance., , , и . Comput. Secur., (2022)Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network., , , , и . Comput. Secur., (2021)