Author of the publication

On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims.

, and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 54-61. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims., and . ICICA (1), volume 105 of Communications in Computer and Information Science, page 54-61. Springer, (2010)An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition., , , , and . ISCSLP, page 384-388. IEEE, (2018)Linkability of a Blind Signature Scheme and Its Improved Scheme., , , and . ICCSA (4), volume 3983 of Lecture Notes in Computer Science, page 262-270. Springer, (2006)Transitioning eMRAM from Pilot Project to Volume Production., , , , , , , , and . ITC, page 82-86. IEEE, (2023)The Sixth Visual Object Tracking VOT2018 Challenge Results., , , , , , , , , and 145 other author(s). ECCV Workshops (1), volume 11129 of Lecture Notes in Computer Science, page 3-53. Springer, (2018)Bridge Defect Diagnosis with Physical Information., , and . Asian Test Symposium, page 248-253. IEEE Computer Society, (2005)Mining Constrained Gradients in Large Databases., , , , , and . IEEE Trans. Knowl. Data Eng., 16 (8): 922-938 (2004)Analyzing Robustness of End-to-End Neural Models for Automatic Speech Recognition., and . CoRR, (2022)Dual Mean-Teacher: An Unbiased Semi-Supervised Framework for Audio-Visual Source Localization., , , , , , , and . CoRR, (2024)End-to-end Flow Correlation Tracking with Spatial-temporal Attention., , , and . CoRR, (2017)