Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping Fuzzy Concepts Between Fuzzy Ontologies., , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 199-205. Springer, (2005)A Framework of Checking Subsumption Relations Between Composite Concepts in Different Ontologies., , , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 953-959. Springer, (2005)Could We Predict the Result of a Continuous Integration Build? An Empirical Study., and . QRS Companion, page 311-315. IEEE, (2017)Refined Approximation of Concepts in Ontology., , , , and . AI*IA, volume 3673 of Lecture Notes in Computer Science, page 82-85. Springer, (2005)移动商务环境中基于交易票据的自动信任协商协议 (Automated Trust Negotiation Protocol Based on Transactional Receipt in Mobile Commerce Environment)., , and . 计算机科学, 43 (10): 160-165 (2016)Reasoning within extended fuzzy description logic., , , and . Knowl. Based Syst., 22 (1): 28-37 (2009)Coordinating the retail supply chain with item-level RFID and excess inventory under a revenue-cost-sharing contract., , , and . Int. Trans. Oper. Res., 28 (3): 1505-1525 (2021)PrivSem: Protecting location privacy using semantic and differential privacy., , , and . World Wide Web, 22 (6): 2407-2436 (2019)An efficient trust negotiation strategy towards the resource-limited mobile commerce environment., , , and . Frontiers Comput. Sci., 10 (3): 543-558 (2016)Annotating semantic tags of locations in location-based social networks., , , , and . GeoInformatica, 24 (1): 133-152 (2020)