Author of the publication

A Cheating Detection Mechanism based on Fuzzy Reputation Management of P2P MMOGs.

, , , , and . SNPD (2), page 75-80. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A double inequality for an integral mean in terms of the exponential and logarithmic means., , , and . Period. Math. Hung., 75 (2): 180-189 (2017)FedDBL: Communication and Data Efficient Federated Deep-Broad Learning for Histopathological Tissue Classification., , , , , , , , , and 6 other author(s). CoRR, (2023)Initial Development and Experiments on a Robotic Fish with a Novel Undulating Fin., , , and . RAM, page 1075-1078. IEEE, (2008)Fault Diagnosis Accuracy Improvement Using Wayside Rectangular Microphone Array for Health Monitoring of Railway-Vehicle Wheel Bearing., , , , , , , and . IEEE Access, (2019)Data Dissemination With Network Coding in Two-Way Vehicle-to-Vehicle Networks., , and . IEEE Trans. Vehicular Technology, 65 (4): 2445-2456 (2016)CIPHER: Construction of dIfferentially Private microdata from low-dimensional Histograms via solving linear Equations with Tikhonov Regularization., and . CoRR, (2018)An effective approach to document retrieval via utilizing WordNet and recognizing phrases., , , and . SIGIR, page 266-272. ACM, (2004)On possibility-degree formulae for ranking interval numbers., , , and . Soft Comput., 22 (8): 2557-2565 (2018)UCBoost: A Boosting Approach to Tame Complexity and Optimality for Stochastic Bandits., , , and . IJCAI, page 2440-2446. ijcai.org, (2018)SUSAN: Segment Unannotated image Structure using Adversarial Network.. CoRR, (2018)