Author of the publication

A numerical algorithm for the construction of efficient quadrature rules in two and higher dimensions.

, and . Comput. Math. Appl., 59 (2): 663-676 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum steganography based on reflected gray code for color images., and . Intell. Decis. Technol., 14 (3): 291-312 (2020)HMM-TCN-based health assessment and state prediction for robot mechanical axis., , , , and . Int. J. Intell. Syst., 37 (12): 10476-10494 (December 2022)A numerical algorithm for the construction of efficient quadrature rules in two and higher dimensions., and . Comput. Math. Appl., 59 (2): 663-676 (2010)On analyzing eavesdropping behaviours in underwater acoustic sensor networks., , , , , , and . WUWNet, page 53. ACM, (2016)Optimal Trust Mining and Computing on Keyed MapReduce., and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 143-150. Springer, (2012)Terahertz Image Super-Resolution Reconstruction of Passive Safety Inspection Based on Generative Adversarial Network., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 22-27. IEEE, (2019)A Dynamic Health Assessment Method for Industrial Equipment Based on SG-FCM Clustering Algorithm., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 34-39. IEEE, (2019)Pulse Waveforms with a Correlation Criterion for Synthetic Aperture Imaging Systems., and . VTC Spring, IEEE, (2009)Simulation Results on Hierarchical Cell Structures., , , , and . FGCN (1), page 79-82. IEEE Computer Society, (2008)Knowledge Enhanced BERT Based on Corpus Associate Generation., , , , and . ML4CS (3), volume 13657 of Lecture Notes in Computer Science, page 533-547. Springer, (2022)