Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Flow Graph: An Approach to Identifying Covert Storage Channels., , , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 87-97. Springer, (2010)Interpreting system for visual query language CQL., , , and . ICIG, page 564-567. IEEE Computer Society, (2004)Extensible Motor of a Object-Relational DBMS: Design and Implementation., , and . TOOLS (31), page 372-379. IEEE Computer Society, (1999)The Research for Spatial Role-Based Access Control Model., , , and . ICCSA (4), volume 6019 of Lecture Notes in Computer Science, page 296-308. Springer, (2010)An Improved PSO Algorithm Encoding a priori Information for Nonlinear Approximation., , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 223-231. Springer, (2009)Research and implementation of graphic service grid system., , , and . CSCWD (1), page 334-338. IEEE Computer Society, (2005)Gene Selection and PSO-BP Classifier Encoding a Prior Information., , and . ICSI (2), volume 6146 of Lecture Notes in Computer Science, page 335-342. Springer, (2010)The Dilemma of Covert Channels Searching., and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 169-174. Springer, (2005)An Improved Approach Combining Random PSO with BP for Feedforward Neural Networks., , , and . AICI, volume 5855 of Lecture Notes in Computer Science, page 361-368. Springer, (2009)DecChain: A decentralized security approach in Edge Computing based on Blockchain., and . Future Gener. Comput. Syst., (2020)