Author of the publication

Detection of a Weak Conjunction of Unstable Predicates in Dynamic Systems.

, , and . ICPADS, page 338-346. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Automatic Tree Ring Measurement System., , and . MVA, page 387-390. (1994)Least-square Support Vector Machine for Financial Crisis Forecast Based on Particle Swarm Optimization.. J. Softw., 9 (2): 313-318 (2014)Stable Predicate Detection in Dynamic Systems., , and . OPODIS, volume 3974 of Lecture Notes in Computer Science, page 161-175. Springer, (2005)Domain Adaptation of Time Series Classification., and . IEEE Access, (2024)Fault detection for discrete piecewise linear systems with infinite distributed time-delays., , , and . Int. J. Systems Science, 48 (16): 3431-3439 (2017)Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules., and . RIIT, page 54. ACM, (2016)ITSEED: hands-on labs for IT security education (abstract only)., and . SIGCSE, page 739. ACM, (2014)Introducing cloud computing with a senior design project in undergraduate education of computer system and network administration., , , and . SIGITE Conference, page 177-182. ACM, (2011)Knowledge Exploration: Teaching Cyber-Security Using Controlled Web-Based Laboratories., and . SIGITE, page 216-217. ACM, (2023)Building an Impersonation Attack and Defense Testbed for Vehicle To Vehicle Systems., , , and . SIGITE, page 65-66. ACM, (2021)