Author of the publication

An Application-Oriented Efficient Encapsulation System for Trusted Software Development.

, , , , and . INTRUST, volume 9565 of Lecture Notes in Computer Science, page 153-168. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remove Irrelevant Atomic Formulas for Timed Automaton Model Checking., , , and . J. Comput. Sci. Technol., 21 (1): 41-51 (2006)Modeling Link Quality for High-Speed Railway Networks Based on Hidden Markov Chain., , , , and . VTC Spring, page 1-5. IEEE, (2016)Dynamic multi-link scheduling for cellular networks in high-speed transportation systems., , , and . IECON, page 6027-6032. IEEE, (2017)A Robust Iris Localization Model Based on Phase Congruency and Least Trimmed Squares Estimation., , , and . ICIAP, volume 5716 of Lecture Notes in Computer Science, page 682-691. Springer, (2009)Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States., , , and . Scientometrics, 93 (3): 1019-1027 (2012)Performance Model Estimation and Tracking Using Optimal Filters., , and . IEEE Trans. Software Eng., 34 (3): 391-406 (2008)Demonstration abstract: applying industrial wireless sensor networks to welder machine system., , , , , and . IPSN, page 319-320. IEEE/ACM, (2014)Environmental monitoring and air-conditioning automatic control with intelligent building wireless sensor network., , , and . ICARCV, page 2431-2436. IEEE, (2010)The Effect of Checklist in Code Review for Inexperienced Students: An Empirical Study., , , and . CSEE&T, page 120-124. IEEE Computer Society, (2012)Duration-constrained regular expressions., , , , and . Formal Asp. Comput., 16 (2): 155-163 (2004)