Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test., , , and . CSSE (3), page 622-626. IEEE Computer Society, (2008)978-0-7695-3336-0.Path selection methods for localized quality of service routing., and . ICCCN, page 102-107. IEEE, (2001)A Load Balancing Package for Domain Decomposition on Distributed Memory Systems., , , and . HPCN Europe, volume 1067 of Lecture Notes in Computer Science, page 547-554. Springer, (1996)Maximizing MPI point-to-point communication performance on RDMA-enabled clusters with customized protocols., and . ICS, page 306-315. ACM, (2009)Trusted Group Key Management for Real-Time Critical Infrastructure Protection., , , , , , , and . MILCOM, page 248-253. IEEE, (2013)Relative Citation Ratio (RCR): A New Metric That Uses Citation Rates to Measure Influence at the Article Level, , , and . PLOS Biology, 14 (9): e1002541+ (Sep 6, 2016)A Deep Generative Deconvolutional Image Model., , , , and . AISTATS, volume 51 of JMLR Workshop and Conference Proceedings, page 741-750. JMLR.org, (2016)From Rank Estimation to Rank Approximation: Rank Residual Constraint for Image Restoration., , , , , and . IEEE Trans. Image Process., (2020)Technology mapping for k/m-macrocell based FPGAs., , and . FPGA, page 51-59. ACM, (2000)Performance Characterization of Machine-to-Machine Networks With Energy Harvesting and Social-Aware Relays., , , , and . IEEE Access, (2017)