Author of the publication

Flow Control Strategy for Flexible Machining and Assembly System.

, , and . PROLAMAT, volume B-3 of IFIP Transactions, page 577-584. North-Holland, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A performance estimation model for AS/RS by M/G/1 queuing system., , , and . Comput. Ind. Eng., 46 (2): 233-241 (2004)A framework for measuring the performance of service supply chain management., , , and . Comput. Ind. Eng., 62 (3): 801-818 (2012)Defending against wireless network intrusion., , , and . J. Comput. Syst. Sci., 80 (3): 499-501 (2014)Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks.. IEICE Trans. Inf. Syst., 98-D (4): 964-967 (2015)Fuzzy Adaptive Selection of Filtering Schemes for Energy Saving in Sensor Networks., and . IEICE Trans. Commun., 90-B (12): 3346-3353 (2007)Fuzzy Rule-Based Enhancing Key Dissemination Method for the Dynamic Filtering-Based Sensor Networks., , and . Int. J. Inf. Acquis., 4 (3): 273-280 (2007)Flow Control Strategy for Flexible Machining and Assembly System., , and . PROLAMAT, volume B-3 of IFIP Transactions, page 577-584. North-Holland, (1992)Detecting truncation point in steady-state simulation using chaos theory., and . WSC, page 353-360. ACM, (1994)Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks., and . UIC, volume 4611 of Lecture Notes in Computer Science, page 535-544. Springer, (2007)Common Requirements for Web Application Vulnerability Scanners for the Internet of Things., and . ICSSA, page 111. IEEE, (2017)