Author of the publication

A novel and fast parallel solution for the vertex cover problem on DNA-based supercomputing.

, , , , and . BIC-TA, page 190-194. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework of Transferring Mobile Services with Agent Based Middleware., , , , and . J. Softw., 6 (8): 1578-1585 (2011)A novel solution for the P2P network observer placement problem on DNA-based supercomputing., , , , , and . BIC-TA, page 185-189. IEEE, (2010)Worm Intrusion Alarm Modeling Based on Network Traffic Character., , , and . IMSCCS (2), page 142-147. IEEE Computer Society, (2006)0-7695-2581-4.Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor., , , , and . SKG, page 27. IEEE Computer Society, (2006)Intrusion Detection Based on Fuzzy Neural Networks., , , and . ISNN (2), volume 3973 of Lecture Notes in Computer Science, page 231-239. Springer, (2006)IRLNet: A Short-Time and Robust Architecture for Automatic Modulation Recognition., , , , and . IEEE Access, (2021)Almost periodic solutions for a class of fourth-order nonlinear differential equations with a deviating argument., and . Comput. Math. Appl., 60 (5): 1184-1190 (2010)An Access Control Model in Lager-Scale P2P File Sharing Systems., , , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 741-744. Springer, (2007)Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security., , , , and . SKG, page 75. IEEE Computer Society, (2006)Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation., , , , , and . SKG, page 74. IEEE Computer Society, (2006)