Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheduling jobs with chain precedence constraints and deteriorating jobs., , and . J. Oper. Res. Soc., 62 (9): 1765-1770 (2011)Measuring the influence of social networks on information diffusion on blogspheres, , and . Machine Learning and Cybernetics, 2009 International Conference on, 6, page 3492--3498. IEEE, (July 2009)SEdroid: A Robust Android Malware Detector using Selective Ensemble Learning., , and . CoRR, (2019)Segmenting the Femoral Head and Acetabulum in the Hip Joint Automatically Using a Multi-Step Scheme., , , , and . IEICE Trans. Inf. Syst., 95-D (4): 1142-1150 (2012)Indoor Localization within Multi-Story Buildings Using MAC and RSSI Fingerprint Vectors., , , , , and . Sensors, 19 (11): 2433 (2019)Symbolic Verification of MPI Programs with Non-deterministic Synchronizations., , , and . SETTA, volume 12153 of Lecture Notes in Computer Science, page 160-176. Springer, (2020)Safety Verification for Neural Networks Based on Set-boundary Analysis., , , , , and . CoRR, (2022)Torch: Strategy evolution in swarm robots using heterogeneous-homogeneous coevolution method., , , , , , and . J. Ind. Inf. Integr., (2022)Towards collaborative storage scheduling using alternating direction method of multipliers for mobile edge cloud., , , , , and . J. Syst. Softw., (2017)NECTAR-An Agent-Based Dynamic Task Allocation Algorithm in the UAV Swarm., , , , , and . Complex., (2020)