Author of the publication

Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods.

, , , and . J. Softw., 10 (9): 1079-1085 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What's Your Next Guess? - - A predictive model for Wordle user gaming based on ARIMA and Bi-LSTM., , , , and . ADMIT, page 163-170. ACM, (2023)Fast DFT matrices transform based on generalized prime factor algorithm., , , and . J. Commun. Networks, 13 (5): 449-455 (2011)Quality evaluation of tourmaline red based on uniform color space.. Clust. Comput., 20 (4): 3393-3408 (2017)Visualising potential innovation pathways in a workshop setting: the case of nano-enabled biosensors., , , , and . Technol. Anal. Strateg. Manag., 24 (5): 527-542 (2012)Tech mining: Text mining and visualization tools, as applied to nanoenhanced solar cells., , and . WIREs Data Mining Knowl. Discov., 1 (2): 172-181 (2011)Nonlinear predictive control of networked systems with delays and packet dropouts., , and . IECON, page 3687-3692. IEEE, (2014)Quantum Error-Correction Codes Based on Multilevel Constructions of Hadamard Matrices., , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 18-24. Springer, (2007)Automatic Image Segmentation Based on a Simplified Pulse Coupled Neural Network., , , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 405-410. Springer, (2004)A Novel Algorithm for CPM-Signal Endpoint Detection Based on Auto Correlation., and . IScIDE, volume 7202 of Lecture Notes in Computer Science, page 104-111. Springer, (2011)Influence of multiple time delays on bifurcation of fractional-order neural networks., , , , , and . Appl. Math. Comput., (2019)