Author of the publication

Multiobjective Cloud Workflow Scheduling: A Multiple Populations Ant Colony System Approach.

, , , , , , , , , and . IEEE Trans. Cybern., 49 (8): 2912-2926 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ant Colony Optimization Approach for Nurse Rostering Problem., , , , , and . SMC, page 1672-1676. IEEE, (2013)Mining Preferred Traversal Paths with HITS., , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 98-107. Springer, (2009)Distributed detection of jamming and defense in wireless sensor networks., and . CISS, page 829-834. IEEE, (2009)Empirical Analysis and Reform Study on the Tradional Interpretation Teaching Model of Undergraduate English Majors Based on Web., and . CSEE (5), volume 218 of Communications in Computer and Information Science, page 128-132. Springer, (2011)Fortify Method of Moving Object Detection Based on Color and Edge Geometrical Features., , , and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1135-1143. Springer, (2008)Evaluating Image Blurring for Photographic Portraiture., and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 540-547. Springer, (2019)Static Output Feedback l2 - l∞ Asynchronous Control of Markov Jump Systems Under Dynamic Event-Triggered Scheme., and . IEEE Access, (2022)Embracing Non-Traditional Linguistic Resources for Low-resource Language Name Tagging., , , , , , and . IJCNLP(1), page 362-372. Asian Federation of Natural Language Processing, (2017)ELISA-EDL: A Cross-lingual Entity Extraction, Linking and Localization System., , , , , , and . NAACL-HLT (Demonstrations), page 41-45. Association for Computational Linguistics, (2018)WebAD ^2 2 : A Cascading Model Based on Machine Learning for Web Attacks Detection., and . ATCS/SePrIoT@SecureComm, volume 239 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 145-165. Springer, (2017)