Author of the publication

An Efficient Approach for Computing Conflict Sets Combining Failure Probability with SAT.

, , , and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 48-58. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Approach for Computing Conflict Sets Combining Failure Probability with SAT., , , and . KSEM (2), volume 11062 of Lecture Notes in Computer Science, page 48-58. Springer, (2018)Face Detection Using R-FCN Based Deformable Convolutional Networks., , , , , and . SMC, page 4165-4170. IEEE, (2018)On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks., , , , and . Sensors, 23 (11): 5075 (2023)A Novel Method of Pseudorandom Sequence Design Based on Hyperchaos System., and . IMECS, page 1337-1340. Newswood Limited, (2007)Construction of GLI1 shRNA expression vector and effects on the proliferation of ovarian cancer cells., , , , , and . ICCA, page 1264-1268. IEEE, (2013)Significance of MMP9 and BRMS1 in metastasis and invasion of breast cancer stem cells., , , , , and . ICCA, page 943-946. IEEE, (2013)3D Object retrieval based on non-local graph neural networks., , , , and . Multim. Tools Appl., 79 (45-46): 34011-34027 (2020)A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network., , , and . COMPSAC (1), page 643-645. IEEE Computer Society, (2007)An Feasible Key Management Scheme in Ad Hoc Network., , , and . SNPD (1), page 300-303. IEEE Computer Society, (2007)Implicit Feature Identification in Chinese Reviews Based on Hybrid Rules., , , and . FSDM, volume 293 of Frontiers in Artificial Intelligence and Applications, page 220-225. IOS Press, (2016)