Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Method to Authenticate Transitively Closed Undirected Graph., , , and . IMSCCS, page 537-542. IEEE Computer Society, (2007)Uncorrelated Discriminant Locality Aware Embedding for Face Recognition., , and . CSIE (4), page 178-181. IEEE Computer Society, (2009)Research and experiments of network attack defence system., , and . SMC (4), page 3548-3553. IEEE, (2004)The Application of Genetic Algorithm to Intrusion Detection in MP2P Network., , , , and . ICSI (1), volume 7331 of Lecture Notes in Computer Science, page 390-397. Springer, (2012)Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux., , and . IMSCCS (2), page 771-775. IEEE Computer Society, (2006)0-7695-2581-4.Low cost token maintains ring-like P2P network., and . EMEIT, page 3607-3610. IEEE, (2011)Research on defending DDoS attack - an expert system approach., , and . SMC (4), page 3554-3558. IEEE, (2004)Task scheduling algorithm based on fireworks algorithm., , , , , , , and . EURASIP J. Wireless Comm. and Networking, (2018)Pareto-Q Learning Algorithm for Cooperative Agents in General-Sum Games., , and . CEEMAS, volume 3690 of Lecture Notes in Computer Science, page 576-578. Springer, (2005)The state of the art in content-based image retrieval in P2P networks., and . ICIMCS, page 143-146. ACM, (2010)