Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Automatic pectoral muscle boundary detection in mammograms based on Markov chain and active contour model., , , and . Journal of Zhejiang University - Science C, 11 (2): 111-118 (2010)Performance of Multi-hop Communications Using Logical Topologies on Optical Torus Networks., , and . J. Parallel Distrib. Comput., 61 (6): 748-766 (2001)Distributed Path Reservation Algorithms for Multiplexed All-Optical Interconnection Networks., , and . IEEE Trans. Computers, 48 (12): 1355-1363 (1999)Algorithms for Supporting Compiled Communication., , and . IEEE Trans. Parallel Distrib. Syst., 14 (2): 107-118 (2003)LID Assignment in InfiniBand Networks., , and . IEEE Trans. Parallel Distrib. Syst., 20 (4): 484-497 (2009)A Load Balancing Package on Distributed Memory Systems and its Application to Particle-Particle Particle-Mesh (P3M) Methods., , , and . Parallel Computing, 23 (10): 1525-1544 (1997)Resource reservation mechanisms for distributed multi-path quality of service routing., , , and . ICCCN, page 9-13. IEEE, (2000)Real-time air quality estimation based on color image processing., , , , and . VCIP, page 326-329. IEEE, (2014)Communication Characteristics in the NAS Parallel Benchmarks., and . IASTED PDCS, page 724-729. IASTED/ACTA Press, (2002)