Author of the publication

A Security Reinforcement Technology of Telematics Box Based on Secure Element.

, , and . ICA3PP (Workshops), volume 11338 of Lecture Notes in Computer Science, page 101-116. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Coupled Legendre-Laguerre Spectral-Element Method for the Navier-Stokes Equations in Unbounded Domains., , and . J. Sci. Comput., 42 (1): 1-22 (2010)Repairing Polygonal Meshes for Volume Meshing., , , , and . CGVR, page 189-195. CSREA Press, (2006)An adaptive configuration method of knots and data parameters for NURBS curve interpolation., , and . ICCSA (6), page 1-7. IEEE, (2018)A Rational Approximation and Its Applications to Differential Equations on the Half Line, , and . Journal of Scientific Computing, 15 (2): 117--147 (2000)Fast Fourier-like Mapped Chebyshev Spectral-Galerkin Methods for PDEs with Integral Fractional Laplacian in Unbounded Domains., , , , and . CoRR, (2019)An overview of projection methods for incompressible flows, , and . Computer Methods in Applied Mechanics and Engineering, 195 (44): 6011 - 6045 (2006)Velocity-Correction Projection Methods for Incompressible Flows, and . SIAM Journal on Numerical Analysis, 41 (1): 112--134 (January 2003)Efficient PAC Learning from the Crowd with Pairwise Comparisons., and . ICML, volume 162 of Proceedings of Machine Learning Research, page 25973-25993. PMLR, (2022)The Menpo Facial Landmark Localisation Challenge: A Step Towards the Solution., , , , and . CVPR Workshops, page 2116-2125. IEEE Computer Society, (2017)Matchmaking Applications and Partitioning Strategies for Efficient Execution on Heterogeneous Platforms., , , and . ICPP, page 560-569. IEEE Computer Society, (2015)