Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Project scheduling based on genetic algorithm.. GrC, page 434-439. IEEE Computer Society, (2009)Staying together maybe better for particles., , and . CEC, page 204-211. IEEE, (2015)Interpersonal Learning Particle Swarm Optimizer., , and . CEC, page 148-155. IEEE, (2015)Leader-following consensus of multi-agent systems with limited data rate., , , and . J. Frankl. Inst., 354 (1): 184-196 (2017)Application and Optimization of Wavelet Transform Filter for North-Seeking Gyroscope Sensor Exposed to Vibration., , , , and . Sensors, 19 (16): 3624 (2019)Iso-surface Rendering Based Uncertainty Visualization for Multi-resolution Volume Data with Regular Grids, , , , and . International Conference on Information Visualization Theory and Applications, page 751--754. SciTePress, (2012)Model and Visualise the Relationship between Energy Consumption and Temperature Distribution in Cold Rooms., , , , and . TPCG, page 71-72. Eurographics Association, (2011)Managing Theories of Trust in Agent Based Systems., and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 442-451. Springer, (2005)Analysis of access control protocols using labelled tableaux.. ICITST, page 610-615. IEEE, (2012)A Formal Approach for Risk Assessment in RBAC Systems.. J. Univers. Comput. Sci., 18 (17): 2432-2451 (2012)