Author of the publication

PNTM Integration of Petri Nets and Transactional Memory.

, , , and . PNSE, volume 723 of CEUR Workshop Proceedings, page 196-199. CEUR-WS.org, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applying blockchain for primary financial market: A survey., , , , , , , and . IET Blockchain, 1 (2-4): 65-81 (2021)A Novel Graph-Based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing., , , , and . IEEE Trans. Serv. Comput., 16 (2): 845-857 (March 2023)Follow Me Fog: Toward Seamless Handover Timing Schemes in a Fog Computing Environment., , , , , , and . IEEE Commun. Mag., 55 (11): 72-78 (2017)A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud., , , , , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1234-1244 (2013)Federated Learning With Nesterov Accelerated Gradient., , , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 4863-4873 (2022)Multiobjective Optimization-Based Task Offloading Combined With Power and Resource Allocation in Mobile Edge Computing., , and . IEEE Syst. J., 17 (4): 5738-5749 (December 2023)Real time Object Tracking based on Local Texture Feature with Correlation Filter., , , , , and . DSP, page 482-486. IEEE, (2016)Multi-Hierarchical Independent Correlation Filters For Visual Tracking., , , and . ICME, page 1-6. IEEE, (2020)VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks., , , , , and . Comput. Secur., (January 2024)A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems., , , , , , and . J. Syst. Softw., 84 (3): 354-376 (2011)