Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Anti-JPEG Compression Image Perceptual Hashing Algorithm., , , , and . ICAIC (2), volume 225 of Communications in Computer and Information Science, page 397-406. Springer, (2011)Unsafe Operations in B-Trees., and . Acta Inf., 26 (5): 421-438 (1989)Incremental evaluation of top-k combinatorial metric skyline query., , , , and . Knowl.-Based Syst., (2015)A short note on the counter-intuitive spurious behaviors in stiff reacting flow., and . J. Comput. Physics, (2015)Research on dynamic business composition based on web service proxies., , , and . Simulation Modelling Practice and Theory, (2013)Improved multi-pass fast correlation attacks with applications., and . SCIENCE CHINA Information Sciences, 54 (8): 1635-1644 (2011)Security analysis of a new stream cipher., and . Science in China Series F: Information Sciences, 49 (3): 286-301 (2006)Finite-time observers for multi-agent systems without velocity measurements and with input saturations., , and . Systems & Control Letters, (2014)Improvements in the Likelihood Ratio Method for Steady-State Sensitivity Analysis and Simulation., and . Perform. Eval., 15 (3): 177-195 (1992)Multi-tier binary solution method for multi-product newsvendor problem with multiple constraints.. European Journal of Operational Research, 218 (2): 426-434 (2012)