Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Modified Signed-Digit Adder., , , , and . IEEE Trans. Computers, 63 (5): 1134-1143 (2014)Parallel belief revision: Revising by sets of formulas., and . Artif. Intell., 176 (1): 2223-2245 (2012)Study on the collaboration mechanism of the virtual reference service., , , and . The Electronic Library, 25 (6): 733-740 (2007)Theoretical mean-variance relationship of IP network traffic based on ON/OFF model., , , , , and . Science in China Series F: Information Sciences, 52 (4): 645-655 (2009)Principles, structures, and implementation of reconfigurable ternary optical processors., , , , , , and . SCIENCE CHINA Information Sciences, 54 (11): 2236-2246 (2011)A Fault Tolerant Topology Control Algorithm for Large-Scale Sensor Networks., , , and . PDCAT, page 407-412. IEEE Computer Society, (2007)Stability analysis and design of a time delay estimation based control for a class of nonlinear uncertain systems., , and . CDC, page 4084-4089. IEEE, (2010)Optimal design of photovoltaic-wind hybrid renewable energy system using a discrete geometric selective harmony search., , , and . CSCWD, page 499-504. IEEE, (2015)Using Row Operation Unit to Realize Reconfigurable Ternary Optical Processor., , and . CIT, page 999-1003. IEEE Computer Society, (2012)Similar vulnerability query based on text mining., , , , , , , and . ISCIT, page 339-342. IEEE, (2011)