Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient hardware design for HDTV H.264/AVC encoder., , , , and . Journal of Zhejiang University - Science C, 12 (6): 499-506 (2011)Block-based second order prediction on AVS-Part 2., , and . PCS, page 542-545. IEEE, (2010)Falling fuzzy ideals of hemirings., and . Journal of Intelligent and Fuzzy Systems, 25 (4): 1037-1042 (2013)Multi-secret visual cryptography with deterministic contrast., and . Multimedia Tools Appl., 72 (2): 1867-1886 (2014)An optimization method for planning the lines and the operational strategies of waterbuses: the case of Zhoushan city., , , , , and . Operational Research, 15 (1): 25-49 (2015)Extending the ONESAF Testbed into a C4ISR Testbed., , , , , , , and . Simulation, 80 (12): 681-691 (2004)Looking at Markov samplers through cusum path plots: a simple diagnostic idea., and . Statistics and Computing, 8 (3): 275-286 (1998)Large Sample Properties of Weighted Monte Carlo Estimators., and . Operations Research, 53 (2): 298-312 (2005)Entropy-based denial-of-service attack detection in cloud data center., , , , and . Concurrency and Computation: Practice and Experience, 27 (18): 5623-5639 (2015)HAaaS: Towards Highly Available Distributed Systems., , , and . CLUSTER, page 618-621. IEEE Computer Society, (2012)