Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two-channel post-filtering based on adaptive smoothing and noise properties., , , and . ICASSP, page 1745-1748. IEEE, (2011)Combining tabu search and graph reduction to solve the maximum balanced biclique problem., and . CoRR, (2017)Assertional Logic: Towards an Extensible Knowledge Model (extended abstract).. CoRR, (2017)Virtual-Grid Based Traffic Control Strategy With Multiple Intersections Collaboration., , and . IEEE Access, (2018)Mitigation Strategy for the Cascading Failure of Complex Networks Based on Node Capacity Control Function., , , , , and . IEEE Access, (2019)Analysis and identification of spamming behaviors in Sina Weibo microblog., , , , , and . SNAKDD, page 5:1-5:9. ACM, (2013)Thermal-Efficiency Benchmark on High-Performance Clusters., , , , and . IGSC, page 1-8. IEEE, (2019)A 2-Approximation Algorithm for Path Coloring on Trees of Rings., , , and . ISAAC, volume 1969 of Lecture Notes in Computer Science, page 144-155. Springer, (2000)Security and Performance in Network Component Architecture., , , and . International Conference on Computational Science (1), volume 3991 of Lecture Notes in Computer Science, page 1055-1058. Springer, (2006)Internet traffic classification based on bag-of-words model., , and . GLOBECOM Workshops, page 736-741. IEEE, (2012)