Author of the publication

Defense strategies and expected capacity of high performance computing infrastructures.

, , , and . ICDCN, page 143-147. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of Publish-Subscribe Systems by Probabilistic Timed Automata., , , and . FORTE, volume 4574 of Lecture Notes in Computer Science, page 247-262. Springer, (2007)Study on Material and Energy Flow in Steel Forging Production Process., , , and . IEEE Access, (2020)A rapid 3D seed-filling algorithm based on scan slice., , and . Comput. Graph., 34 (4): 449-459 (2010)On Array Theory of Bounded Elements., , , and . CAV, volume 6174 of Lecture Notes in Computer Science, page 570-584. Springer, (2010)Data mining based decomposition for assume-guarantee reasoning., , , , and . FMCAD, page 116-119. IEEE, (2009)Robust experimental design and feature selection in signal transduction pathway modeling., , , and . IJCNN, page 1544-1551. IEEE, (2008)Termination analysis for evolving programs: an incremental approach by reusing certified modules., and . Proc. ACM Program. Lang., 4 (OOPSLA): 199:1-199:27 (2020)Incremental predicate analysis for regression verification., , and . Proc. ACM Program. Lang., 4 (OOPSLA): 184:1-184:25 (2020)Data-driven dynamical modelling of a pathogen-infected plant gene regulatory network: A comparative analysis., , and . Biosyst., (2022)Mobile computing and communications-driven fog-assisted disaster evacuation techniques for context-aware guidance support: A survey., , , and . Comput. Commun., (2021)