Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Goal-Directed Modeling of Self-adaptive Software Architecture., , , and . BMMDS/EMMSAD, volume 29 of Lecture Notes in Business Information Processing, page 313-325. Springer, (2009)Atomically thin resonant tunnel diodes built from synthetic van der Waals heterostructures, , , , , , , , , and 1 other author(s). Nature communications, (2015)Research on Construction of EAI-Oriented Web Service Architecture., , and . GCC (1), volume 3032 of Lecture Notes in Computer Science, page 592-600. Springer, (2003)Recovering Object-Oriented Framework for Software Product Line Reengineering., , , , and . ICSR, volume 6727 of Lecture Notes in Computer Science, page 119-134. Springer, (2011)Towards Feature-Oriented Variability Reconfiguration in Dynamic Software Product Lines., , , and . ICSR, volume 6727 of Lecture Notes in Computer Science, page 52-68. Springer, (2011)一种基于子图搜索的特征定位方法 (Feature Location Method Based on Sub-graph Searching)., , , and . 计算机科学, 44 (4): 56-59 (2017)A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things., , , , , and . IEEE Trans. Ind. Informatics, 15 (6): 3582-3592 (2019)Robust and sparse canonical correlation analysis for fault detection and diagnosis using training data with outliers., , , , and . Expert Syst. Appl., (February 2024)An Improved PSO Algorithm Based Multimodality Medical Image Automatic Registration., , and . ICNC (7), page 574-578. IEEE Computer Society, (2008)Research on Cyberattack Detection of Connected Automated Vehicles Based on Support Vector Machine., , , , and . ICITE, page 372-378. IEEE, (2022)