Author of the publication

Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm.

, , , , and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 913-921. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction., , , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 176-184. Springer, (2009)Landmark-Based Spectral Clustering with Local Similarity Representation., , , and . NCTCS, volume 768 of Communications in Computer and Information Science, page 198-207. Springer, (2017)Incremental Manifold Learning Algorithm Using PCA on Overlapping Local Neighborhoods for Dimensionality Reduction., , , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 406-415. Springer, (2008)Fingerprint Enhancement Using Circular Gabor Filter., , and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 750-758. Springer, (2004)DDoS Attack Detection Method Based on Linear Prediction Model., , , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 1004-1013. Springer, (2009)Efficiently Passive Monitoring Flow Bandwidth., , , , and . NPC, volume 3779 of Lecture Notes in Computer Science, page 266-269. Springer, (2005)A fast and accurate method for detecting fingerprint reference point., , and . Neural Comput. Appl., 29 (1): 21-31 (2018)A simple approach for unsupervised domain adaptation., , and . ICPR, page 1566-1570. IEEE, (2016)Evaluating the effectiveness of situational case-based teaching: a view of concept mapping., , , , and . TURC, page 60-66. ACM, (2018)A New RGB-D Gesture Video Dataset and Its Benchmark Evaluations on Light-Weighted Networks., , , , , and . NCTCS, volume 1494 of Communications in Computer and Information Science, page 47-58. Springer, (2021)