Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Storyboarding - High-Level Engineering of Web Information Systems., , and . WISE, volume 5802 of Lecture Notes in Computer Science, page 7-8. Springer, (2009)Multi-objective Container Consolidation in Cloud Data Centers., , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 783-795. Springer, (2018)A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique., , , , , and . Inf. Sci., (2015)Optimizing Throughput with Carrier Sensing Adaptation for IEEE 802.11 Mesh Networks Based on Loss Differentiation., , and . ICC, page 4967-4972. IEEE, (2007)Modelling and Maintenance of Very Large Database Schemata Using Meta-structures., , and . UNISCON, volume 20 of Lecture Notes in Business Information Processing, page 17-28. Springer, (2009)Memetic EDA-Based Approaches to Comprehensive Quality-Aware Automated Semantic Web Service Composition., , , and . CoRR, (2019)A Calculation Method for the On-Load Cogging Torque of Permanent Magnet Synchronous Machine., , , and . IEEE Access, (2019)Passive GNSS-Based SAR Resolution Improvement Using Joint Galileo E5 Signals., , and . IEEE Geosci. Remote. Sens. Lett., 12 (8): 1640-1644 (2015)Level Crossing Rate and Average Fade Duration for the Beaulieu-Xie Fading Model., , , and . IEEE Wirel. Commun. Lett., 6 (3): 326-329 (2017)Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications., , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 625-634 (2019)