Author of the publication

On the hardness of counting problems of complete mappings.

, , and . Discret. Math., 277 (1-3): 87-100 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Are Two Visual Cognition Systems Better Than One?, , , , and . Brain Informatics and Health, volume 8609 of Lecture Notes in Computer Science, page 33-44. Springer, (2014)Packet Routing in Fixed-Connection Networks: A Survey., , and . J. Parallel Distributed Comput., 54 (2): 77-132 (1998)Comparing Rank and Score Combination Methods for Data Fusion in Information Retrieval., and . Inf. Retr., 8 (3): 449-480 (2005)Introduction.. Networks, 23 (4): 211-213 (1993)A New Measure for Locally t-Diagnosable Under PMC Model., , and . COCOON, volume 13025 of Lecture Notes in Computer Science, page 306-316. Springer, (2021)Combinatorial Fusion Analysis in Brain Informatics: Gender Variation in Facial Attractiveness Judgment., , , , and . AMT, volume 6890 of Lecture Notes in Computer Science, page 8-26. Springer, (2011)Experimental Results from Using a Rank and Fuse Approach for Multi-Target Tracking in CCTV Surveillance., , , and . AVSS, page 67-72. IEEE Computer Society, (2003)Identifying Significant Genes from Microarray Data., , , , , and . BIBE, page 358-365. IEEE Computer Society, (2004)Feature Selection and Combination Criteria for Improving Predictive Accuracy in Protein Structure Classification., , , , , , , and . BIBE, page 311-315. IEEE Computer Society, (2005)Graph Containers, Information Delay, and Network Vulnerability.. AINA (1), page 16-22. IEEE Computer Society, (2004)