Author of the publication

Matching of R&D Resources for Complex Products Based on the Two-Sided Matching Theory.

, , and . ICIBE, page 99-102. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)Origami-inspired soft twisting actuator., , , , , , , , , and 1 other author(s). CoRR, (2021)Big data driven Internet of Things for credit evaluation and early warning in finance., , , and . Future Gener. Comput. Syst., (2021)A DCT-based privacy-preserving approach for efficient data mining., , , , , and . Secur. Commun. Networks, 8 (18): 3641-3652 (2015)Space-Air-Ground Integrated Network Resource Allocation Based on Service Function Chain., , , and . IEEE Trans. Veh. Technol., 71 (7): 7730-7738 (2022)Assessment of a Gauge-Radar-Satellite Merged Hourly Precipitation Product for Accurately Monitoring the Characteristics of the Super-Strong Meiyu Precipitation over the Yangtze River Basin in 2020., , , , and . Remote. Sens., 13 (19): 3850 (2021)A Network Traffic Classification Method Based on Graph Convolution and LSTM., , , and . IEEE Access, (2021)Finite-Time Formation Control for Unmanned Aerial Vehicle Swarm System With Time-Delay and Input Saturation., , , and . IEEE Access, (2019)Data Security and Privacy Protection for Cloud Storage: A Survey., , and . IEEE Access, (2020)