Author of the publication

Research on Trusted Access Technology of Grid Resource Based on the Virtual Machine.

, , , , and . ICYCS, page 1384-1388. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bipartite Toughness and k-Factors in Bipartite Graphs., , , and . Int. J. Math. Mathematical Sciences, (2008)Clustering of high-dimensional gene expression data with feature filtering methods and diffusion maps., , , and . Artif. Intell. Medicine, 48 (2-3): 91-98 (2010)A Cascade Sequence-to-Sequence Model for Chinese Mandarin Lip Reading., , and . MMAsia, page 32:1-32:6. ACM, (2019)Travelling waves and global attractivity of an SIRS disease model with spatial diffusion and temporary immunity., and . Appl. Math. Comput., (2013)Geometry-based propagation of temporal constraints., , , , and . Inf. Syst. Frontiers, 19 (4): 855-868 (2017)Study of Dynamic Group Evolution for Health Prediction of Mangrove Ecosystem., , , , , and . IIAI-AAI, page 79-84. IEEE, (2019)Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation., , , , and . Quantum Inf. Process., 11 (6): 1359-1369 (2012)General Identifiability Condition for Network Topology Monitoring with Network Tomography., , , , , and . Sensors, 19 (19): 4125 (2019)Infix to prefix conversion as a PST reduction., and . ACM SIGPLAN Notices, 25 (5): 34-38 (1990)A Comparison of GANs-Based Approaches for Combustor System Fault Detection., and . IJCNN, page 1-8. IEEE, (2020)