Author of the publication

Library resources semantization based on resource ontology.

, , and . Electron. Libr., 32 (3): 341-362 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of an Identity-Based Signature From Factorization Problem., , , and . IEEE Access, (2020)Library resources semantization based on resource ontology., , and . Electron. Libr., 32 (3): 341-362 (2014)A Trace-restricted Kronecker-Factored Approximation to Natural Gradient., , , , , , and . CoRR, (2020)A Composite Internal Model Robust Control Strategy for an Automobile Steer-by-wire System., , and . IECON, page 29-34. IEEE, (2020)A Multi-Vehicle Longitudinal Trajectory Collision Avoidance Strategy Using AEBS With Vehicle-Infrastructure Communication., , , , , , , , and . IEEE Trans. Veh. Technol., 71 (2): 1253-1266 (2022)Space Efficient CMOS Nonlinear Transmission Lines., , and . ISCAS, page 2073-2076. IEEE, (2009)What is the value of knowing uninformed trades?. Economics Letters, 64 (1): 87--98 (July 1999)Using Control Theory to Guide Load Shedding in Medical Data Stream Management System., , , , , , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 236-248. Springer, (2005)A Three-Dimensional Ultrasonic Pen-Type Input Device With Millimeter-Level Accuracy for Human-Computer Interaction., , , and . IEEE Access, (2020)The acquisition method of the user's Kansei needs based on double matrix recommendation algorithm., , , and . J. Intell. Fuzzy Syst., 41 (2): 3809-3820 (2021)