Author of the publication

An Efficient Machine Reading Comprehension Method Based on Attention Mechanism.

, , and . ISPA/BDCloud/SocialCom/SustainCom, page 1297-1302. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application in Handwritten Digit Recognition of Deep Belief Network Based on Improved Genetic Algorithm., , and . AINA (3), volume 227 of Lecture Notes in Networks and Systems, page 10-16. Springer, (2021)Analysis And Comparison Of Flexure Structures Used In 3-D Electrostatic Microactuators For Hard Disk Drives., , and . International Journal of Computational Engineering Science, 4 (2): 227-230 (2003)Development And Comparison Of Micromachined Inductors For Rf Applications., , , and . International Journal of Computational Engineering Science, 4 (2): 363-367 (2003)Study On Feature Of Silicon Microtrenches With A Multiplexed Inductively Coupled Plasma Etcher., , , , and . International Journal of Computational Engineering Science, 4 (2): 319-322 (2003)Micromachining Process Of Piezoelectric Microcantilever Using Pzt Thin Film., , , , and . International Journal of Computational Engineering Science, 4 (3): 509-512 (2003)A Conceptual Framework for Vendor Selection based on Supply Chain Risk Management from a Literature Review., , and . LISS (1), page 183-186. SciTePress, (2011)Large Scale Homing in Honeybees, , , and . PLOS ONE, 6 (5): 1-7 (May 2011)Private higher education: An international bibliography, , , , and . Information Age Pub., Greenwich, CT, (2004)Outlier Detection Method of Environmental Streams Based on Kernel Density Estimation., , , and . CWSN, volume 501 of Communications in Computer and Information Science, page 467-480. Springer, (2014)On the Properties of Cryptographic Protocols and the Weakness of the BAN-like Logics., , and . ACM SIGOPS Oper. Syst. Rev., 31 (4): 12-23 (1997)