Author of the publication

A gyrokinetic continuum code based on the numerical Lie transform (NLT) method.

, , , , and . J. Comput. Physics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A priority-based CCA threshold adjusting method for EWM dissemination in vehicular ad-hoc networks., , , , and . Wireless Networks, 21 (5): 1563-1576 (2015)A business-to-business e-commerce system using software agents and RFID., , , and . Comput. Syst. Sci. Eng., (2013)Which One Should be Chosen for the Mobile Geographic Information Service Now, WAP vs. i-mode vs. J2ME?, and . MONET, 11 (6): 901-915 (2006)TERSE: A Unified End-to-End Traffic Control Mechanism to Enable Elastic, Delay Adaptive, and Rate Adaptive Services., , , and . IEEE Journal on Selected Areas in Communications, 29 (5): 938-950 (2011)Improving energy efficiency of buffer cache in virtual machines., and . IGCC, page 1-10. IEEE Computer Society, (2012)A gyrokinetic continuum code based on the numerical Lie transform (NLT) method., , , , and . J. Comput. Physics, (2016)Modeling and Compound Control for Unmanned Turret System With Coupling., , , and . IEEE Trans. Industrial Electronics, 63 (9): 5794-5803 (2016)Abnormal hotspots detection method based on region real-time congestion factor., , , , , , and . ITSC, page 749-753. IEEE, (2016)V2V channel allocation method based on SWM communication demand matrix., , , , , , and . ITSC, page 2095-2100. IEEE, (2016)Driving behavior modeling and evaluation for bus enter and leave stop process., , , , , , and . J. Ambient Intelligence and Humanized Computing, 9 (5): 1647-1658 (2018)