Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On 2-rainbow domination of generalized Petersen graphs., , , , , , and . Discrete Applied Mathematics, (2019)A Causality Analysis Framework for Component-Based Real-Time Systems., , , , , and . RV, volume 8174 of Lecture Notes in Computer Science, page 285-303. Springer, (2013)A Safety-Assured Development Approach for Real-Time Software., , , , , and . RTCSA, page 133-142. IEEE Computer Society, (2010)Multiplicative Zagreb indices of k-trees., and . Discrete Applied Mathematics, (2015)A Certificateless Signature and Group Signature Schemes against Malicious PKG., and . AINA, page 334-341. IEEE Computer Society, (2008)Structure Properties of Koch Networks Based on Networks Dynamical Systems., , and . Complexity, (2017)Research on mechanisms of providing electronic public services for information vulnerable groups in China.. ICEGOV, volume 444 of ACM International Conference Proceeding Series, page 295-300. ACM, (2010)A Hybrid Approach to Causality Analysis., , , , and . RV, volume 9333 of Lecture Notes in Computer Science, page 250-265. Springer, (2015)The Values of Public Library in Promoting an Open Government Environment., , and . DG.O, page 481-490. ACM, (2016)The Application of Blog in Modern Education., and . CSSE (4), page 1083-1085. IEEE Computer Society, (2008)978-0-7695-3336-0.