Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Checkpointing and rollback-recovery algorithms in distributed systems., and . Journal of Systems and Software, 25 (1): 59-71 (1994)An Improved Radius of Gyration Similarity Measure between Generalized Fuzzy Numbers and Its Application to Multisource Data Fusion., , , and . JCP, 6 (8): 1732-1739 (2011)Unsupervised maritime traffic pattern extraction from spatio-temporal data., , , , and . ICNC, page 1218-1223. IEEE, (2015)A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature., , , , , , and . FSKD, page 2217-2221. IEEE, (2011)A novel matrix game with payoffs of Maxitive Belief Structure., and . Int. J. Intell. Syst., 34 (4): 690-706 (2019)An Approach to Locate Parametric Faults in Nonlinear Analog Circuits., , and . IEEE Trans. Instrumentation and Measurement, 61 (2): 358-367 (2012)Diagnosis of Incipient Faults in Weak Nonlinear Analog Circuits., , and . CSSP, 32 (5): 2151-2170 (2013)Matrix games with payoffs of belief structures., , and . Applied Mathematics and Computation, (2016)Defuzzify firstly or finally: Dose it matter in fuzzy DEMATEL under uncertain environment?, , , and . CoRR, (2014)A new method in failure mode and effects analysis based on evidential reasoning., , , , and . Int. J. Systems Assurance Engineering and Management, 5 (1): 1-10 (2014)