From post

Theory and Algorithm Based on the General Similar Relationship between the Approximate Reduction.

, и . ICICA (LNCS), том 7030 из Lecture Notes in Computer Science, стр. 128-135. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Theory and Algorithm Based on the General Similar Relationship between the Approximate Reduction., и . ICICA (LNCS), том 7030 из Lecture Notes in Computer Science, стр. 128-135. Springer, (2011)Prior knowledge-based fuzzy Support Vector Regression., , и . FUZZ-IEEE, стр. 392-395. IEEE, (2008)Medium optimization of antifungal metabolites produced by Bacillus globisporus A95 using response surface methodology., , , , , и . ICNC, стр. 384-388. IEEE, (2010)A design study for network based storage systems and performance evaluation., , , и . ICON, стр. 156-161. IEEE, (2002)Local Discontinuous Galerkin Method for Incompressible Miscible Displacement Problem in Porous Media., , и . J. Sci. Comput., 71 (2): 615-633 (2017)Outage Performance of Cognitive Multi-Hop Network under Interference Constraints over Nakagami-m Fading., , и . J. Commun., 11 (7): 686-692 (2016)Accurate Power Sharing of Hybrid Energy Storage System in DC Shipboard Power System Based on Quadratic Programming Algorithm., , , , , и . ISIE, стр. 1123-1128. IEEE, (2020)Ambiguity Function Analysis of Wireless LAN Transmissions for Passive Radar., , , , и . IEEE Trans. Aerosp. Electron. Syst., 47 (1): 240-264 (2011)Towards a Secure Certificateless Proxy Re-Encryption Scheme., , , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 330-346. Springer, (2013)Toward extraction of security requirements from text: poster., , , , и . HotSoS, стр. 27:1. ACM, (2018)