Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improvement Crypton Protocol with Higher Security Margin., , , and . JNW, 9 (10): 2788-2795 (2014)Data sharpening methods in multivariate local quadratic regression., , and . J. Multivariate Analysis, 105 (1): 258-275 (2012)Reliability Analysis of Multi-Stress Accelerated Life Test Based on BP Neural Network., and . BIFE, page 6-9. IEEE Computer Society, (2012)Simulation analysis of EKF and UKF implementations in PHD filter., and . ICNSC, page 1-6. IEEE, (2016)Using Cluster Analysis and Least Square Support Vector Machine to Predicting Power Demand for the Next-Day., , , and . IEEE Access, (2019)Culture modulates brain activity during empathy with anger., , , , , , , and . NeuroImage, 59 (3): 2871-2882 (2012)A simulation cloud monitoring framework and its evaluation model., , , , , and . Simulation Modelling Practice and Theory, (2013)A green-aware virtual machine migration strategy for sustainable datacenter powered by renewable energy., , , and . Simulation Modelling Practice and Theory, (2015)An autonomic provisioning framework for outsourcing data center based on virtual appliances., , , , , , and . Cluster Computing, 11 (3): 229-245 (2008)Multi-cluster Load Balancing Based on Process Migration., , , and . APPT, volume 4847 of Lecture Notes in Computer Science, page 100-110. Springer, (2007)