From post

Petri Net Based on Behavior of Token and Its Applications.

, , и . ICAIC (4), том 227 из Communications in Computer and Information Science, стр. 656-663. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Web Clustering Using a Two-Layer Approach., , , и . WISM (2), том 6988 из Lecture Notes in Computer Science, стр. 211-218. Springer, (2011)Solving Network Testbed Mapping Problem with Genetic Algorithm., , и . AIAI, том 187 из IFIP, стр. 441-449. Springer, (2005)Public integrity auditing for dynamic group cooperation files with efficient user revocation., , , и . Comput. Stand. Interfaces, (2023)Light-efficient channel attention in convolutional neural networks for tic recognition in the children with tic disorders., , , , , , и . Frontiers Comput. Neurosci., (2022)A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security., , и . Int. J. Netw. Secur., 22 (4): 645-654 (2020)基于场景切变和内容特征检测的去隔行算法 (Deinterlacing Algorithm Based on Scene Change and Content Characteristics Detection)., , , и . 计算机科学, 46 (3): 154-158 (2019)A faster outsourced medical image retrieval scheme with privacy preservation., , , и . J. Syst. Archit., (2022)Blockchain-based auditing with data self-repair: From centralized system to distributed storage., , , и . J. Syst. Archit., (апреля 2023)Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks., , и . NaNA, стр. 93-99. IEEE Computer Society, (2017)Scheduling Parallel Machines with a Single Server: A Dedicated Case., , и . CSO, стр. 146-149. IEEE Computer Society, (2012)