Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workflow Refactoring for Maximizing Concurrency and Block-Structuredness., , , , and . IEEE Trans. Serv. Comput., 14 (4): 1224-1237 (2021)Optimizing a Disassembly Sequence Planning With Success Rates of Disassembly Operations via a Variable Neighborhood Search Algorithm., and . IEEE Access, (2021)Strengthened Linear Sampling Method with a Reference Ball., , and . SIAM J. Sci. Comput., 31 (6): 4013-4040 (2009)On Electromagnetic Scattering from a Penetrable Corner., and . SIAM J. Math. Anal., 49 (6): 5207-5241 (2017)On Novel Geometric Structures of Laplacian Eigenfunctions in ℝ3 and Applications to Inverse Problems., , , and . SIAM J. Math. Anal., 53 (2): 1263-1294 (2021)Industrial Wastewater Discharge Retrieval Based on Stable Nighttime Light Imagery in China from 1992 to 2010., , , , , and . Remote Sensing, 6 (8): 7566-7579 (2014)Gradient Estimates for Electric Fields with MultiScale Inclusions in the Quasi-Static Regime., , and . Multiscale Model. Simul., 20 (1): 641-656 (March 2022)Two Single-Shot Methods for Locating Multiple Electromagnetic Scatterers., , , and . SIAM J. Appl. Math., 73 (4): 1721-1746 (2013)SSL Malicious Traffic Detection Based On Multi-view Features., , , , , and . ICCNS, page 40-46. ACM, (2019)An Applied Research of Persuasion Theory in the Design of Weight Management Applications., and . HCI (24), volume 13325 of Lecture Notes in Computer Science, page 59-71. Springer, (2022)