Author of the publication

Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays.

, , , , and . IEEE Trans. Parallel Distributed Syst., 23 (11): 2138-2149 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Accuracy for 3D RFID Localization., , , , and . IJDSN, (2012)LDB: Localization with Directional Beacons for Sparse 3D Underwater Acoustic Sensor Networks., , , , and . J. Networks, 5 (1): 28-38 (2010)Detecting Outlier Measurements Based on Graph Rigidity for Wireless Sensor Network Localization., , , , , and . IEEE Trans. Veh. Technol., 62 (1): 374-383 (2013)Neural Architecture Search using Deep Neural Networks and Monte Carlo Tree Search, , , , and . (2018)cite arxiv:1805.07440Comment: To appear in the Thirty-Fourth AAAI conference on Artificial Intelligence (AAAI-2020).Multi-objective Optimization by Learning Space Partitions., , , , , and . CoRR, (2021)Carbon-Efficient Neural Architecture Search., and . HotCarbon, page 12:1-12:7. ACM, (2023)Design and Performance Test of A 6-Rotational-Joint Machining Robotic Arm Based on Harmonic Actuator., , , , and . M2VIP, page 623-628. IEEE, (2021)Robust and Fast Similarity Search for Fingerprint Calibrations-Free Indoor Localization., , , and . BigCom, page 320-327. IEEE Computer Society, (2017)Real Time Object Detection Based on FPGA with Big Data., , , , , , and . BigCom, page 54-59. IEEE Computer Society, (2018)ToAuth: Towards Automatic Near Field Authentication for Smartphones., , , , and . TrustCom, page 229-236. IEEE Computer Society, (2014)