Author of the publication

Adaptive Simulated Annealing for Standard Cell Placement.

, , , and . ICNC (3), volume 3612 of Lecture Notes in Computer Science, page 943-947. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)Financial Crimes in Web3-Empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . IEEE Open J. Comput. Soc., (2023)CytoPipeline and CytoPipelineGUI: a Bioconductor R package suite for building and visualizing automated pre-processing pipelines for flow cytometry data., , , , , , , and . BMC Bioinform., 25 (1): 80 (December 2024)A Parallel Algorithm For Anonymizing Large-scale Trajectory Data., , and . Trans. Data Sci., 1 (1): 5:1-5:26 (2020)DeepCLA: A Hybrid Deep Learning Approach for the Identification of Clathrin., , , , , and . J. Chem. Inf. Model., 61 (1): 516-524 (2021)Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs., , , , and . ACM Trans. Intell. Syst. Technol., 9 (6): 63:1-63:28 (2018)MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs., , , , , and . IEEE Trans. Mob. Comput., 16 (5): 1357-1370 (2017)MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization., , and . SSDBM, page 35:1-35:6. ACM, (2017)Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding., , , , , , and . CoRR, (2019)Financial Crimes in Web3-empowered Metaverse: Taxonomy, Countermeasures, and Opportunities., , , , , and . CoRR, (2022)