Author of the publication

Enhanced Second-order Implicit Constraint Enforcement for Dynamic Simulations.

, , , , and . KSII Trans. Internet Inf. Syst., 2 (1): 51-62 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restoration scheme of mobility databases by mobility learning and prediction in PCS networks., , , , , and . IEEE J. Sel. Areas Commun., 19 (10): 1962-1973 (2001)FCA-based θ-iceberg core decomposition in graphs., , and . J. Ambient Intell. Humaniz. Comput., 15 (2): 1423-1428 (February 2024)Urban Area Function Zoning Based on User Relationships in Location-Based Social Networks., , , , , and . IEEE Access, (2020)SOSP: a stepwise optimal sparsity pursuit algorithm for practical compressed sensing., , , , and . Multim. Tools Appl., 78 (1): 3-26 (2019)K-Clique Community Detection in Social Networks Based on Formal Concept Analysis, , , , and . (2015)Live Mobile Distance Learning System for Smart Devices., , , and . Symmetry, 7 (2): 294-304 (2015)An Induced Hesitant Linguistic Aggregation Operator and Its Application for Creating Fuzzy Ontology., , , , and . KSII Trans. Internet Inf. Syst., 12 (10): 4952-4975 (2018)A Development of Hybrid Drug Information System Using Image Recognition., , and . Symmetry, 7 (2): 376-382 (2015)Movie Recommendation Algorithm Using Social Network Analysis to Alleviate Cold-Start Problem., , and . J. Inf. Process. Syst., 15 (3): 616-631 (2019)Secure Bluetooth Piconet Using Non-anonymous Group Key., , , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 766-777. Springer, (2002)