Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Figure Captioning with Reasoning and Sequence-Level Training., , , , , , , and . CoRR, (2019)A real-world online signature verification system based on correlation algorithm., , and . Int. J. Comput. Appl. Technol., 58 (4): 321-339 (2018)Ajax live regions: chat as a case example., and . W4A, volume 225 of ACM International Conference Proceeding Series, page 7-14. ACM, (2007)Applying Statistical Modeling to Predict Basketball Winning Percentage., , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 44-52. IOS Press, (2018)Measuring Patients' Perceptions and Social Influence on Home Telecare Management System Acceptance., and . IJHISI, 5 (3): 44-68 (2010)Virtual Factories and Dynamic Core Competency: a Case Study of Advanced semiconductor Engineering.. PACIS, page 251. AISeL, (2008)Multi Barcode Scanning and Decoding Technology Based on AR Smart Glasses., and . J. Inf. Hiding Multim. Signal Process., 12 (4): 226-238 (2021)Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications., , , , , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 62-81. Springer, (2012)Constrained Language Models Yield Few-Shot Semantic Parsers., , , , , , , , , and . EMNLP (1), page 7699-7715. Association for Computational Linguistics, (2021)New Anti-phishing Method with Two Types of Passwords in OpenID System., , , , and . ICGEC, page 69-72. IEEE Computer Society, (2011)