Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended resource space model., , , and . Future Generation Comp. Syst., 21 (1): 189-198 (2005)Stable and Spectrally Accurate Schemes for the Navier-Stokes Equations., and . SIAM J. Scientific Computing, 33 (5): 2421-2439 (2011)Remarks on Zhang-Kim's Key Authentication Scheme., and . I. J. Network Security, 8 (2): 199-200 (2009)A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol., and . I. J. Network Security, 11 (2): 114-117 (2010)A GPU-based Fast Solution for Riesz Space Fractional Reaction-Diffusion Equation., , , , and . NBiS, page 317-323. IEEE Computer Society, (2015)Arbitrary shape reconstruction from NC sectional data and applications in space cutter compensation and interference detection., , , , and . CAD/Graphics, page 435-441. IEEE, (2009)AdaptSens: An Adaptive Data Collection and Storage Service for Solar-Powered Sensor Networks., , , , , , and . RTSS, page 303-312. IEEE Computer Society, (2009)Parallel Loop Scheduling With Data Prefetching On Distributed-Memory Machine., , and . PDPTA, page 702-712. CSREA Press, (1996)Personal Recommendation Based on Weighted Bipartite Networks., , and . FSKD (5), page 134-137. IEEE Computer Society, (2009)Modelling and simulation of a fuzzy PID controller for active suspension system., , , and . FSKD, page 701-705. IEEE, (2010)