Author of the publication

When to Re-staff a Late Project - An E-CARGO Approach.

, , , , , and . ICCSA (5), volume 9790 of Lecture Notes in Computer Science, page 201-217. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees., , , , , , and . ICDM Workshops, page 898-905. IEEE Computer Society, (2014)When to Re-staff a Late Project - An E-CARGO Approach., , , , , and . ICCSA (5), volume 9790 of Lecture Notes in Computer Science, page 201-217. Springer, (2016)Doctors' Personalized Outpatient Scheduling via the Many to Many Assignment with Spatio-temporal Constraints., , , and . CSCWD, page 767-772. IEEE, (2018)A cooperative multi-classifier method for local area meteorological data mining., , , , , , and . CSCWD, page 435-440. IEEE, (2014)RBAC role-permission assignment with conflicting constraints based on the E-CARGO model., , , , and . ICCI*CC, page 424-430. IEEE Computer Society, (2014)Multiple Assignment in Task Allocation of Communication Base Stations., , , , , and . ChineseCSCW, page 161-164. ACM, (2017)An Inference Model of Temporal Logic in an Intelligent Decision Support System of Salary., , , , and . CSCWD, page 351-354. IEEE, (2002)A Cooperative Intrusion Detection Model Based on Granular Computing and Agent Technologies., , , and . IJATS, 5 (3): 54-74 (2013)A Role-Permission Assignment Method of RBAC Involved Conflicting Constraints under E-CARGO., , , , , and . IJCINI, 9 (4): 49-64 (2015)Solving the M2M Recommendation Problem via Group Multi-Role Assignment., , , , and . CSCWD, page 606-611. IEEE, (2018)