Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Component Oriented Modelling and Design of Fuzzy Control Scheme for a Class of Pneumatic Actuators., , and . Journal of Intelligent and Fuzzy Systems, 5 (3): 229-243 (1997)A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption., , and . Security and Communication Networks, 7 (1): 14-32 (2014)Preference-Aware Web Service Composition Using Hierarchical Reinforcement Learning., and . Web Intelligence/IAT Workshops, page 315-318. IEEE Computer Society, (2009)978-0-7695-3801-3.Integrating Trust with Qualitative and Quantitative Preference for Service Selection., , and . IEEE SCC, page 299-306. IEEE Computer Society, (2014)Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Services Computing, 10 (4): 574-588 (2017)Adaptive and large-scale service composition based on deep reinforcement learning., , , , , , , , and . Knowl.-Based Syst., (2019)Online reliability time series prediction via convolutional neural network and long short term memory for service-oriented systems., , , , and . Knowl.-Based Syst., (2018)A service computing manifesto: the next 10 years., , , , , , , , , and 14 other author(s). Commun. ACM, 60 (4): 64-72 (2017)Identity-Based Higncryption., and . IACR Cryptology ePrint Archive, (2019)Delegatable Order-Revealing Encryption., , and . AsiaCCS, page 134-147. ACM, (2019)