Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an Optimal Information Security Investment Strategy., and . ICNSC, page 756-761. IEEE, (2008)Exploring knowledge grid for knowledge supply in the collaborative design., , , , and . ICNSC, page 1663-1667. IEEE, (2008)Collision avoidance planning of manipulator based on C-space layered search arithmetic., and . EMEIT, page 3258-3262. IEEE, (2011)Rethink the Linearizability Constraints of Raft for Distributed Key-Value Stores., , , and . ICDE, page 1877-1882. IEEE, (2021)Practical Root Cause Localization for Microservice Systems via Trace Analysis., , , , , , , , , and 5 other author(s). IWQoS, page 1-10. IEEE, (2021)An Improved Sparrow Search Algorithm for Global Optimization with Customization-Based Mechanism., , , , and . Axioms, 12 (8): 767 (August 2023)Contrast-Guided Line Segment Detection., , , and . IEEE Signal Process. Lett., (2024)Role Engine Implementation for a Continuous and Collaborative Multirobot System., , , , , and . IEEE Trans. Syst. Man Cybern. Syst., 54 (2): 866-877 (February 2024)Product Platform Planning: an approach using Genetic Algorithm., , , , and . ICNSC, page 1621-1625. IEEE, (2008)LASSO-Based Detection and Identification of Actuator Integrity Attacks in Remote Control Systems., , , , and . IEEE Trans. Control. Syst. Technol., 32 (2): 696-704 (March 2024)