Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Wire-Sizing Formular Under the Elmore Delay Model., , and . DAC, page 487-490. ACM Press, (1996)An iterated local search algorithm for the permutation flowshop problem with total flowtime criterion., , and . Comput. Oper. Res., 36 (5): 1664-1669 (2009)A multi-restart iterated local search algorithm for the permutation flow shop problem minimizing total flow time., , , and . Comput. Oper. Res., 40 (2): 627-632 (2013)Berry-Esseen bound of wavelet estimators in heteroscedastic regression model with random errors., , and . Int. J. Comput. Math., 96 (4): 821-852 (2019)Feedback control can make data structure layout randomization more cost-effective under zero-day attacks., , , , and . Cybersecurity, 1 (1): 3 (2018)Batch Invocation of Web Services in BPEL Process., , , , , and . ICSOC, volume 5364 of Lecture Notes in Computer Science, page 511-516. (2008)PLBP: An effective local binary patterns texture descriptor with pyramid representation., , , and . Pattern Recognit., 44 (10-11): 2502-2515 (2011)The Effect of Multi-Bit Correlation on the Design of Field-Programmable Gate Array Routing Resources., and . IEEE Trans. Very Large Scale Integr. Syst., 19 (2): 283-294 (2011)Age-invariant Face Recognition Based on Sample Enhancement of Generative Adversarial Networks., , , and . ICSAI, page 388-392. IEEE, (2019)An improved dynamic membrane evolutionary algorithm for constrained engineering design problems., , , and . Nat. Comput., 15 (4): 579-589 (2016)