Author of the publication

Process-based Security Detection Approach for Virtual Machines on Private Cloud Platforms.

, , , and . J. Networks, 8 (6): 1380-1386 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lagrangian Relaxation for Complex Job Shop Scheduling., , and . ICRA, page 1432-1437. IEEE, (2006)On minimal orthographic view covers for polyhedra., and . Shape Modeling International, page 96-102. IEEE Computer Society, (2009)DAR-Net: Dynamic Aggregation Network for Semantic Scene Segmentation., , and . CoRR, (2019)Computing the Inner Distances of Volumetric Models for Articulated Shape Description with a Visibility Graph., , and . IEEE Trans. Pattern Anal. Mach. Intell., 33 (12): 2538-2544 (2011)Two cartesian closed subcategories of fuzzy domains., and . Fuzzy Sets Syst., (2014)A hybrid differential evolution approach based on surrogate modelling for scheduling bottleneck stages., , , and . Comput. Oper. Res., (2016)Mortality prediction system for heart failure with orthogonal relief and dynamic radius means., , , , , and . Int. J. Medical Informatics, (2018)An effective teaching-learning-based optimization algorithm for the flexible job-shop scheduling problem with fuzzy processing time., , , and . Neurocomputing, (2015)The Potential Clinical Application Value of a Traditional Chinese MEdicine HongJin XiaoJie in the Treatment of Thyroid Nodules., , , and . BIBE, page 8:1-8:7. ACM, (2020)A SVM-Based Fraud Detection System Using Short-lived Electricity Consumption Data., , , , , and . ICITEE, page 114:1-114:6. ACM, (2019)