Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From C to Interaction Trees: Specifying, Verifying, and Testing a Networked Server., , , , , , , , and . CoRR, (2018)From C to interaction trees: specifying, verifying, and testing a networked server., , , , , , , , and . CPP, page 234-248. ACM, (2019)Reasoning about the garden of forking paths., , and . Proc. ACM Program. Lang., 5 (ICFP): 1-28 (2021)Images Crack Detection Technology based on Improved K-means Algorithm., , and . Journal of Multimedia, 9 (6): 822-828 (2014)A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS., , , and . IEEE NAS, page 265-266. IEEE Computer Society, (2007)Water mapping through Universal Pattern Decomposition Method and Tasseled Cap Transformation., , , , , and . IGARSS, page 4758-4760. IEEE, (2014)Effects of approximate representation in belief propagation for inference in wireless sensor networks., and . ACSSC, page 532-536. IEEE, (2013)Application of DDDAS in marine oil spill management: A new framework combining multiple source remote sensing monitoring and simulation as a symbiotic feedback control system., , , , , and . IGARSS, page 4526-4529. IEEE, (2013)Technology Transfer in Cross-national Context: Experiences of an Online Market Failure in Chinese Food Industry., , and . PACIS, page 26. AISeL, (2005)An improved fast marching method and its application in Alzheimer's disease., , , , and . Int. J. Imaging Systems and Technology, 23 (4): 346-352 (2013)