Author of the publication

A study and implementation of self-adaptive allocation algorithm for parallel program.

, , , , , and . CSTST, page 583-588. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WebLab: a data-centric, knowledge-sharing bioinformatic platform., , , , , , , , , and . Nucleic Acids Res., 37 (Web-Server-Issue): 33-39 (2009)IoT-Based Information System on Cold-Chain Logistics Service Quality (ICCLSQ) Management in Logistics 4.0., , , and . Inf. Syst. Frontiers, 26 (2): 689-708 (April 2024)A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing., , , , , , and . Quantum Inf. Process., 20 (7): 1-12 (2021)Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement., , , , , , and . Quantum Eng., (2021)Retrieving Deep Web Data through Multi-Attributes Interfaces with Structured Queries., , and . Int. J. Softw. Eng. Knowl. Eng., 21 (4): 523-542 (2011)The optimal dividend barrier in the perturbed compound Poisson risk model with randomized observation time., , and . J. Systems Science & Complexity, 28 (2): 451-470 (2015)Adaptive probability marking traceback scheme to enhance security in wireless sensor networks., , and . ICICS, page 1-5. IEEE, (2015)A non-linear model for micropower rectifiers in UHF-band RFIDs., and . ICECS, page 1057-1060. IEEE, (2010)A Novel Magnetic-Geared Machine with Dual Flux Modulators., , , and . IECON, page 349-354. IEEE, (2018)A Network Embedding Based Approach for Telecommunications Fraud Detection., and . CDVE, volume 11151 of Lecture Notes in Computer Science, page 229-236. Springer, (2018)