
BibTeX records: Z. C. Li
@article{DBLP:journals/kbs/LiQHCY19, author = {Z. C. Li and B. Qian and R. Hu and L. L. Chang and J. B. Yang}, title = {An elitist nondominated sorting hybrid algorithm for multi-objective flexible job-shop scheduling problem with sequence-dependent setups}, journal = {Knowl. Based Syst.}, volume = {173}, pages = {83--112}, year = {2019}, url = {https://doi.org/10.1016/j.knosys.2019.02.027}, doi = {10.1016/j.knosys.2019.02.027}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/LiQHCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LiCGX06, author = {Z. C. Li and Y. L. Chan and Xenophontos Georgiou and Xenophontos Xenophontos}, title = {Special boundary approximation methods for laplace equation problems with boundary singularities - Applications to the motz problem}, journal = {Comput. Math. Appl.}, volume = {51}, number = {1}, pages = {115--142}, year = {2006}, url = {https://doi.org/10.1016/j.camwa.2005.01.030}, doi = {10.1016/j.camwa.2005.01.030}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/LiCGX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/LuL05, author = {Tzon{-}Tzer Lu and Z. C. Li}, title = {The cracked-beam problem solved by the boundary approximation method}, journal = {Appl. Math. Lett.}, volume = {18}, number = {1}, pages = {11--16}, year = {2005}, url = {https://doi.org/10.1016/j.aml.2004.07.017}, doi = {10.1016/j.aml.2004.07.017}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/appml/LuL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmtm/LiJDPT05, author = {Z. C. Li and Yue Jiao and Timothy W. Deines and Z. J. Pei and Clyde Treadwell}, title = {Development of an innovative coolant system for rotary ultrasonic machining}, journal = {Int. J. Manuf. Technol. Manag.}, volume = {7}, number = {2/3/4}, pages = {318--328}, year = {2005}, url = {https://doi.org/10.1504/IJMTM.2005.006835}, doi = {10.1504/IJMTM.2005.006835}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmtm/LiJDPT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LiHCCTC01, author = {Z. C. Li and Lucas Chi Kwong Hui and K. P. Chow and C. F. Chong and Wai Wan Tsang and H. W. Chan}, title = {Security of Wang et al.'s group-oriented (t, n) threshold signature schemes with traceable signers}, journal = {Inf. Process. Lett.}, volume = {80}, number = {6}, pages = {295--298}, year = {2001}, url = {https://doi.org/10.1016/S0020-0190(01)00179-X}, doi = {10.1016/S0020-0190(01)00179-X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LiHCCTC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/Li90, author = {Z. C. Li}, title = {Discrete techniques for computer transformations of digital images and patterns}, journal = {Pattern Recognit.}, volume = {23}, number = {11}, pages = {1249--1273}, year = {1990}, url = {https://doi.org/10.1016/0031-3203(90)90120-A}, doi = {10.1016/0031-3203(90)90120-A}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/Li90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.