Author of the publication

A Risk-Aware Reputation Mechanism for Resource Sharing on Grids.

, , and . CIT (1), page 223-227. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Escaping Local Minima in Search-Based Planning using Soft Duplicate Detection., , , and . IROS, page 2365-2371. IEEE, (2019)Sample Generation Combining Generative Adversarial Networks and Residual Dense Networks., , , , , and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 212-220. Springer, (2019)Parameters optimization of support vector regression based on immune particle swarm optimization algorithm., , , , , and . GEC Summit, page 997-1000. ACM, (2009)Exponential Synchronization of Coupled Switched Neural Networks With Mode-Dependent Impulsive Effects., , , and . IEEE Trans. Neural Networks Learn. Syst., 24 (8): 1316-1326 (2013)A multi-faceted method for science classification schemes (SCSs) mapping in networking scientific resources., , , and . Scientometrics, 105 (3): 2035-2056 (2015)Highly Selective, ppb-Level Xylene Gas Detection by Sn2+-Doped NiO Flower-Like Microspheres Prepared by a One-Step Hydrothermal Method., , , , , , , , , and 5 other author(s). Sensors, 19 (13): 2958 (2019)A fuzzy constraint handling technique for decomposition-based constrained multi- and many-objective optimization., , , , and . Inf. Sci., (2022)Incorporating heterogeneous information in deep learning with informative meta-paths for community recommendations., , and . J. Inf. Sci., 49 (5): 1309-1324 (October 2023)Application of Improved SMOTE and XGBoost Algorithm in the Analysis of Psychological Stress Test for College Students.. J. Electr. Comput. Eng., (2022)CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms., , , , , , , , , and 1 other author(s). GandALF, volume 370 of EPTCS, page 147-161. (2022)