Author of the publication

The comparison between nonlinear and linear preconditioning JFNK method for transient neutronics/thermal-hydraulics coupling problem

, , , , , and . Annals of Nuclear Energy, (2019)
DOI: 10.1016/j.anucene.2019.04.053

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The comparison between nonlinear and linear preconditioning JFNK method for transient neutronics/thermal-hydraulics coupling problem, , , , , and . Annals of Nuclear Energy, (2019)Efficient Compactions between Storage Tiers with PrismDB., , , and . ASPLOS (3), page 179-193. ACM, (2023)Continuous Error Timing in Automation: The Peak-End Effect on Human-Automation Trust., , , and . Int. J. Hum. Comput. Interact., 40 (8): 1832-1844 (April 2024)Topology optimisation and customisation of a prosthetic knee joint design., and . Int. J. Computer Integrated Manufacturing, 26 (10): 968-976 (2013)Minimise joint clearance in rapid fabrication of non-assembly mechanisms., and . Int. J. Computer Integrated Manufacturing, 24 (8): 726-734 (2011)Evaluating Anti-Fingerprinting Privacy Enhancing Technologies., , and . WWW, page 351-362. ACM, (2019)Practical Volume-Based Attacks on Encrypted Databases., , , and . IACR Cryptology ePrint Archive, (2019)Selection Pushdown in Column Stores using Bit Manipulation Instructions., , and . Proc. ACM Manag. Data, 1 (2): 178:1-178:26 (2023)The Effectiveness of Privacy Enhancing Technologies against Fingerprinting., , and . CoRR, (2018)Practical Volume-Based Attacks on Encrypted Databases., , , and . EuroS&P, page 354-369. IEEE, (2020)