Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of HOS Software Specification by a Hierarchical Software Understanding Approach., and . Journal of Systems and Software, 32 (2): 135-142 (1996)Practical hybrid pre-filtering shadow maps., , , and . CAD/Graphics, page 117-121. IEEE, (2009)Automatic traffic incident detection based on nFOIL., , , and . Expert Syst. Appl., 39 (7): 6547-6556 (2012)A hybrid model of partial least squares and neural network for traffic incident detection., , , and . Expert Syst. Appl., 39 (5): 4775-4784 (2012)Comprehensive Safety Assessment Model of Road Long Tunnel Based on VISSIM., , , , and . Intelligent Automation & Soft Computing, 20 (4): 501-514 (2014)Visual Content Identification and Search., , and . IEEE MultiMedia, 18 (3): 8-10 (2011)On the Design and Implementation of NDSAIL: A Software Automation System with Automated Learning Mechanisms., , , , , , , and . IFIP Congress (1), volume A-12 of IFIP Transactions, page 186-192. North-Holland, (1992)Towards a Model Logic for p-Calculus., , and . COMPSAC, page 330-335. IEEE Computer Society, (2004)Tree logic with recursion and model checking algorithm., , and . IASTED Conf. on Software Engineering and Applications, page 588-593. IASTED/ACTA Press, (2004)Signal recovery and wavelet reproducing kernels., , and . IEEE Trans. Signal Processing, 42 (7): 1845-1848 (1994)