Author of the publication

How to find the optimal paths in stochastic time-dependent transportation networks?

, , , and . ITSC, page 2348-2353. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling Document Interactions for Learning to Rank with Regularized Self-Attention., and . CoRR, (2020)A New Method of 3D Facial Expression Animation., and . J. Appl. Math., (2014)On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage., , , , and . IACR Cryptology ePrint Archive, (2019)A low-power, reconfigurable smart sensor system for EEG acquisition and classification., , , , , and . APCCAS, page 9-12. IEEE, (2012)Improving Mongolian-Chinese Machine Translation with Automatic Post-editing., , , and . ICONIP (1), volume 12532 of Lecture Notes in Computer Science, page 766-775. Springer, (2020)Word-Level Error Correction in Non-autoregressive Neural Machine Translation., , , and . ICONIP (4), volume 1332 of Communications in Computer and Information Science, page 726-733. Springer, (2020)A Multi-Scenario Prediction and Spatiotemporal Analysis of the Land Use and Carbon Storage Response in Shaanxi., , , , , , , , and . Remote. Sens., 15 (20): 5036 (October 2023)Application of fuzzy image restoration in criminal investigation.. J. Vis. Commun. Image Represent., (2020)MLQE-PE: A Multilingual Quality Estimation and Post-Editing Dataset., , , , , , , , and . CoRR, (2020)When NTT Meets SIS: Efficient Side-channel Attacks on Dilithium and Kyber., , , , and . IACR Cryptol. ePrint Arch., (2023)