Author of the publication

Heuristic Search for Scheduling Flexible Manufacturing Systems Using Multiple Heuristic Functions.

, , and . IEA/AIE (1), volume 8481 of Lecture Notes in Computer Science, page 178-187. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks., , , , , , , and . CoRR, (2019)A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol., , , and . J. Networks, 9 (10): 2622-2628 (2014)Power allocation algorithm based on mixed integer nonlinear programming in WSN., , and . Clust. Comput., 22 (Supplement): 4519-4525 (2019)EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles., , , , and . J. Syst. Archit., (2021)A TPM-based Secure Multi-Cloud Storage Architecture grounded on Erasure Codes., , , and . Int. J. Inf. Secur. Priv., 11 (1): 52-64 (2017)Hypergraph-Based Joint Channel and Power Resource Allocation for Cross-Cell M2M Communication in IIoT., , , , and . IEEE Internet Things J., 10 (17): 15350-15361 (September 2023)An outlier ensemble for unsupervised anomaly detection in honeypots data., , , and . Intell. Data Anal., 24 (4): 743-758 (2020)Lifetime-Driven Scheduling of Security-Critical Internet-of-Things Applications on Real-Time Heterogeneous Multicore Systems., , , , , and . HPCC/DSS/SmartCity/DependSys, page 1466-1474. IEEE, (2021)Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing., , , , , and . GLOBECOM, page 1-6. IEEE, (2020)Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group., , and . ACSW, page 76:1-76:6. ACM, (2017)