Author of the publication

A perturbation approach for a type of inverse linear programming problems.

, , , and . Int. J. Comput. Math., 88 (3): 508-516 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A traffic localization strategy for peer-to-peer live streaming., , , , and . ISCC, page 495-501. IEEE Computer Society, (2013)FADE: Detecting forwarding anomaly in software-defined networks., , and . ICC, page 1-6. IEEE, (2016)JTracker - A Tool for Change Propagation in Java., , and . CSMR, page 223-229. IEEE Computer Society, (2003)An ontology-based approach to Chinese semantic advertising., , and . Inf. Sci., (2012)Image fusion with morphological component analysis., and . Information Fusion, (2014)ANNs on Co-occurrence Matrices for Mobile Malware Detection., , , , and . TIIS, 9 (7): 2736-2754 (2015)An improved method for concept location during Program Comprehension., and . SNPD, page 106-111. IEEE Computer Society, (2004)Detecting Mobile Malware with TMSVM., , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 507-516. Springer, (2014)An Efficiency Pipeline Processing Approach for OpenFlow Switch., , and . LCN, page 204-207. IEEE Computer Society, (2016)Research on the Measurement System of Gyro Rotor., , and . CSSE (5), page 721-724. IEEE Computer Society, (2008)978-0-7695-3336-0.