Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method to Prevent Cascading Trip in Power Network Based on Nodal Power., , , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 302-309. Springer, (2019)A Method of Power Network Security Analysis Considering Cascading Trip., , , , and . ICGEC, volume 1107 of Advances in Intelligent Systems and Computing, page 171-180. Springer, (2019)Software Transactional Memory: Why Is It Only a Research Toy?, , , , , , and . Queue, 6 (5): 46--58 (2008)Instance-wise points-to analysis for loop-based dependence testing., , , and . ICS, page 262-273. ACM, (2002)Modelling and Analysis of Network Security - an Algebraic Approach., , and . CoRR, (2015)A Location Privacy Preserving Method Based on Sensitive Diversity for LBS., , , , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 409-422. Springer, (2014)Replayable Execution Optimized for Page Sharing for a Managed Runtime Environment., , and . EuroSys, page 39:1-39:16. ACM, (2019)Whether the Evolution of iSchool Revolves Around "Information, Technology and People"?, , and . iConference, volume 11420 of Lecture Notes in Computer Science, page 601-613. Springer, (2019)Position-Based User-Centric Radio Resource Management in 5G UDN for Ultra-Reliable and Low-Latency Vehicular Communications., , , and . ICC Workshops, page 1-6. IEEE, (2019)Estimation of Economic Indicators using Residual Neural Network ResNet50., and . ICDM Workshops, page 206-209. IEEE, (2019)