Author of the publication

An enhanced backward recursive PCE-based computation scheme for end-to-end disjoint paths in multi-domain networks.

, , , , , and . Photonic Netw. Commun., 24 (1): 22-28 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Are the Best Adopters? User Selection Model for Free Trial Item Promotion., , , , , and . CoRR, (2022)A Minimax Game for Generative and Discriminative Sample Models for Recommendation., , , , , and . PAKDD (2), volume 11440 of Lecture Notes in Computer Science, page 420-431. Springer, (2019)PATR: A Novel Poisoning Attack Based on Triangle Relations Against Deep Learning-Based Recommender Systems., , , , , and . CollaborateCom (2), volume 407 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 435-450. Springer, (2021)Investigation of NbOx-based volatile switching device with self-rectifying characteristics., , , , , , , and . Sci. China Inf. Sci., 62 (12): 229401 (2019)In Materia Neuron Spiking Plasticity for Sequential Event Processing Based on Dual-Mode Memristor., , , , , , , , , and . Adv. Intell. Syst., (2022)An isolated symmetrical 2T2R cell enabling high precision and high density for RRAM-based in-memory computing., , , , , , , and . Sci. China Inf. Sci., (2024)A High Accuracy Multiple-Command Speech Recognition ASIC Based on Configurable One-Dimension Convolutional Neural Network., , , , , and . ISCAS, page 1-4. IEEE, (2021)Who are the Best Adopters? User Selection Model for Free Trial Item Promotion., , , , , and . IEEE Trans. Big Data, 9 (2): 746-757 (April 2023)Ready for Emerging Threats to Recommender Systems? A Graph Convolution-based Generative Shilling Attack., , , , , and . CoRR, (2021)Robustness Analysis of Triangle Relations Attack in Social Recommender Systems., , , , and . CLOUD, page 557-565. IEEE, (2020)