From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discrete gradient methods and linear projection methods for preserving a conserved quantity of stochastic differential equations., , , и . Int. J. Comput. Math., 95 (12): 2511-2524 (2018)A compact ADI Crank-Nicolson difference scheme for the two-dimensional time fractional subdiffusion equation., , и . Int. J. Comput. Math., 95 (12): 2525-2538 (2018)TRUSTER: TRajectory Data Processing on ClUSTERs., , , и . DASFAA, том 5463 из Lecture Notes in Computer Science, стр. 768-771. Springer, (2009)Multivoltage Floorplan Design., и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 29 (4): 607-617 (2010)Cε-LDE: A lightweight variant of differential evolution algorithm with combined ε constrained method and Lévy flight for constrained optimization problems., , , , , и . Expert Syst. Appl., (2023)WAVE: Edge-Device Cooperated Real-Time Object Detection for Open-Air Applications., , , , , и . IEEE Trans. Mob. Comput., 22 (7): 4347-4357 (июля 2023)Three-Dimensional Path Following of an Underactuated AUV Based on Fuzzy Backstepping Sliding Mode Control., , , и . Int. J. Fuzzy Syst., 20 (2): 640-649 (2018)A Sub-linear, Massive-scale Look-alike Audience Extension System A Massive-scale Look-alike Audience Extension., , , и . BigMine, том 53 из JMLR Workshop and Conference Proceedings, стр. 51-67. JMLR.org, (2016)A probabilistic constant amplitude life diagram modeling method for composite materials considering spatial mapping relation., , , , и . Qual. Reliab. Eng. Int., 39 (5): 2027-2043 (июля 2023)Cyber attack estimation and detection for cyber-physical power systems., , , , , , и . Appl. Math. Comput., (2021)