Author of the publication

Two-dimensional occluded object matching using petri nets.

, and . Int. J. Intell. Syst., 17 (3): 303-320 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Petri nets: a graph model for the representation and analysis of concurrent systems (abstract).. ACM Conference on Computer Science, page 495. ACM, (1986)Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion., , , , and . AINA, page 546-551. IEEE Computer Society, (2009)What is the best way to prove a cryptographic protocol correct?, and . IPDPS, page 1-7. IEEE, (2008)Two-dimensional occluded object matching using petri nets., and . Int. J. Intell. Syst., 17 (3): 303-320 (2002)Rule-Based Design Methodology for Solving Control Problems., and . IEEE Trans. Software Eng., 17 (3): 274-282 (1991)PNSOFT: a menu-driven software package for Petri-net modeling and analysis., , and . ICCL, page 41-47. IEEE Computer Society, (1988)Cost Minimization in Utility-driven Distributed Computing Systems with Central-Server Model., and . CAINE, page 86-91. ISCA, (2010)An Object Oriented GUI for Clustering Technique Based Network Simulations., , and . ESM, page 92-96. SCS Europe, (1998)An Internet application for on-line banking., , and . Comput. Commun., 20 (16): 1534-1540 (1998)Non-evolutionary algorithm for scheduling dependent tasks in distributed heterogeneous computing environments., and . J. Parallel Distributed Comput., 65 (9): 1035-1046 (2005)