Author of the publication

Design a High-Level Language for Large Network Security Management.

, , , , , and . OTM Workshops, volume 3292 of Lecture Notes in Computer Science, page 7-8. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Holographic Projection System with 3D Spatial Interaction., and . DaEng, volume 285 of Lecture Notes in Electrical Engineering, page 409-416. Springer, (2013)A New DSP Architecture for Correcting Errors Using Viterbi Algorithm., , , and . AISA, volume 2402 of Lecture Notes in Computer Science, page 95-102. Springer, (2002)Information Extraction and Synchronization Control Method for Multi-Human Animation., and . WSCG, (2000)Deep learning with support vector data description., , and . Neurocomputing, (2015)Deep learning of support vector machines with class probability output networks., , , and . Neural Networks, (2015)TMO: Textured Mesh Acquisition of Objects with a Mobile Device by using Differentiable Rendering., , , , , , and . CVPR, page 16674-16684. IEEE, (2023)GenFlow: Generalizable Recurrent Flow for 6D Pose Refinement of Novel Objects., , , and . CoRR, (2024)Access Control List Mediation System for Large-Scale Network., , , , and . PDCAT, page 483-487. IEEE Computer Society, (2005)Intention Estimation and Recommendation System Based on Attention Sharing., , , and . ICONIP (1), volume 8226 of Lecture Notes in Computer Science, page 395-402. Springer, (2013)Deep Network with Support Vector Machines., , and . ICONIP (1), volume 8226 of Lecture Notes in Computer Science, page 458-465. Springer, (2013)