Author of the publication

A Jackson Network-Based Model for Quantitative Analysis of Network Security.

, , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 517-522. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Block Minimum Residual Norm Subspace Solver with Partial Convergence Management for Sequences of Linear Systems., , and . SIAM J. Matrix Anal. Appl., 43 (2): 710-739 (2022)A New Projected Variant of the Deflated Block Conjugate Gradient Method., , and . J. Sci. Comput., 80 (2): 1116-1138 (2019)Study on the optimization and management of electricity purchase in jiangxi province based on the electricity markets., , , and . CSCWD, page 566-569. IEEE, (2016)Short-term load forecasting based on data mining., , , and . CSCWD, page 170-173. IEEE, (2016)On-Line Inference for Fuzzy Controllers in Continuous Domains., and . ICFIE, volume 62 of Advances in Intelligent and Soft Computing, page 1111-1118. (2009)Semi-supervised adaptive feature analysis and its application for multimedia understanding., , , , and . Multimedia Tools Appl., 77 (3): 3083-3104 (2018)Metric for Estimating Congruity between Quantum Images., , and . Entropy, 18 (10): 360 (2016)A Hybrid Fusion Technique for Watermarking Digital Images., , , , and . ICSS, volume 240 of Advances in Intelligent Systems and Computing, page 207-217. Springer, (2013)Flexible representation and manipulation of audio signals on quantum computers., , , and . Theor. Comput. Sci., (2018)Progressive Local Filter Pruning for Image Retrieval Acceleration., , , , , and . CoRR, (2020)