Author of the publication

The Local Front Reconstruction Method for direct simulation of two- and three-dimensional multiphase flows.

, , and . J. Comput. Physics, 230 (17): 6605-6646 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computation of the curvature field in numerical simulation of multiphase flow.. J. Comput. Physics, 222 (2): 872-878 (2007)A First Step Toward Network Security Virtualization: From Concept To Prototype., , and . IEEE Trans. Information Forensics and Security, 10 (10): 2236-2249 (2015)Vulnerabilities of network OS and mitigation with state-based permission system., , , , and . Security and Communication Networks, 9 (13): 1971-1982 (2016)QoSE: Quality of security a network security framework with distributed NFV., , , , , and . ICC, page 1-6. IEEE, (2016)Doppelgängers on the Dark Web: A Large-scale Assessment on Phishing Hidden Web Services., , , , and . WWW, page 2225-2235. ACM, (2019)HEX Switch: Hardware-assisted security extensions of OpenFlow., , and . SecSoN@SIGCOMM, page 33-39. ACM, (2018)DPX: Data-Plane eXtensions for SDN Security Service Instantiation., , , , , , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 415-437. Springer, (2019)Barista: An Event-centric NOS Composition Framework for Software-Defined Networks., , , , , and . INFOCOM, page 980-988. IEEE, (2018)Network Iron Curtain: Hide Enterprise Networks with OpenFlow., , and . WISA, volume 8267 of Lecture Notes in Computer Science, page 218-230. Springer, (2013)Finding Compact Class Sets for Korean Font Image Classification., , , , and . ACPR, page 226-231. IEEE Computer Society, (2017)