Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and accurate kernel density approximation using a divide-and-conquer approach., , , and . Journal of Zhejiang University - Science C, 11 (9): 677-689 (2010)TRainbow: a new trusted virtual machine based platform., , , , , , , , , and . Frontiers of Computer Science in China, 4 (1): 47-64 (2010)An improved ant colony optimization for the communication network routing problem., , and . Mathematical and Computer Modelling, 52 (11-12): 1976-1981 (2010)Robustness of full implication algorithms based on interval-valued fuzzy inference., and . Int. J. Approx. Reasoning, (2015)Improving Semi-Supervised Target Alignment via Label-Aware Base Kernels., , , and . AAAI, page 2106-2112. AAAI Press, (2014)An enhanced iterative improvement method for evaluating the maximum number of simultaneous switching gates for combinational circuits., , , and . ASP-DAC, page 107-112. IEEE, (1997)Fuzzy Predictive Control in Czochralski Crystal Growth with Power Input as the Unique Manipulation., , and . FSKD (3), page 566-571. IEEE Computer Society, (2009)A distance-based separator representation for pattern classification., and . Image Vision Comput., 26 (5): 667-672 (2008)A Fuzzy Clustering Approach Using Reward and Penalty Functions., , , and . FSKD (6), page 18-21. IEEE Computer Society, (2009)Differential attack on image encryption algorithm using binary bitplane., , , and . FSKD, page 2519-2522. IEEE, (2015)