Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Runtime Generation of Association Rules., , and . CIKM, page 466-473. ACM, (2001)A Compositional Multiple Policies Operating System Security Model., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 291-302. Springer, (2007)Understanding Security Vulnerabilities in File Systems., , and . APSys, page 8-15. ACM, (2019)Gray Correlation Model of Enterprise Commercial Credit Risk Assessment.. ICICA (1), volume 391 of Communications in Computer and Information Science, page 519-530. Springer, (2013)VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS., , and . ICICS, volume 8233 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)Anisotropic diffusion for object segmentation., and . SMC, page 1563-1567. IEEE, (2000)Event Ticket Price Prediction with Deep Neural Network on Spatial-Temporal Sparse Data., and . CoRR, (2019)Multi-physics simulations for combined temperature/humidity loading of potted electronic assemblies., , and . Microelectron. Reliab., 54 (6-7): 1182-1191 (2014)Large Feedback Arc Sets, High Minimum Degree Subgraphs, and Long Cycles in Eulerian Digraphs., , , , and . Comb. Probab. Comput., 22 (6): 859-873 (2013)Nonsingular Terminal Sliding Mode Control Based on Sensor-Cloud System for Permanent Magnet in-Wheel Motor., , , and . IEEE Access, (2020)