Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching method for emergency plans of highway traffic based on fuzzy sets and rough sets., , , and . J. Intell. Fuzzy Syst., 29 (6): 2421-2427 (2015)Data Mining Method for Incident duration Prediction., and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 484-492. Springer, (2011)PI Index of Extremal Simple Pericondensed Hexagonal Systems., , and . Ars Comb., (2012)Research for e-commerce platform security framework based on SOA., , and . BMEI, page 2171-2174. IEEE, (2011)Development of water-soluble sono/photo-sensitive nanopartices for cancer treatment., , , , and . ISCAS, page 1516-1519. IEEE, (2010)An energy-efficient QoS routing scheme for many-to-many multicast requests in green multi-granularity transport networks., , and . FSKD, page 1050-1054. IEEE, (2013)A multi-constrained multicast traffic grooming algorithm in IP over wavelength division multiplexing networks., , , and . FSKD, page 2029-2033. IEEE, (2015)A Risk Identification Method of Virtual Enterprise., , , , and . ICEB, page 687-691. Academic Publishers/World Publishing Corporation, (2004)TVDR: A Two-Level Virtual Domain Routing Scheme for Content-Centric Networking., , and . IEEE Access, (2018)A Living Time-Based Parallel Multi-Path Routing Algorithm for Mobile Ad Hoc Networks., , and . ICICA (2), volume 244 of Communications in Computer and Information Science, page 424-433. Springer, (2011)