From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The New Progress in the Research of Binary Vulnerability Analysis., , , и . ICCCS (2), том 11064 из Lecture Notes in Computer Science, стр. 265-276. Springer, (2018)Simulation and Analysis of the Topographic Effects on Snow-Free Albedo over Rugged Terrain., , , , , , , и . Remote Sensing, 10 (2): 278 (2018)Effect on Generalization of Using Relational Information in List-Wise Algorithms., , , , и . ICPCA/SWS, том 7719 из Lecture Notes in Computer Science, стр. 108-121. Springer, (2012)Predicting Students' Academic Procrastination in Blended Learning Course Using Homework Submission Data., , , , , , и . IEEE Access, (2019)The Electrochemical Behavior of Carbon Fiber Microelectrodes Modified with Carbon Nanotubes Using a Two-Step Electroless Plating/Chemical Vapor Deposition Process., , , , , и . Sensors, 17 (4): 725 (2017)Course Recommendation Model in Academic Social Networks Based on Association Rules and Multi -similarity., , , , , , и . CSCWD, стр. 277-282. IEEE, (2018)Personalized Recommendation Based on Implicit Social Network of Researchers., , , , и . ICPCA/SWS, том 7719 из Lecture Notes in Computer Science, стр. 97-107. Springer, (2012)Defending against Internet worms: a signature-based approach., и . INFOCOM, стр. 1384-1394. IEEE, (2005)Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data., , , , и . CSCWD, стр. 693-698. IEEE, (2016)An interval type-2 fuzzy model of computing with words., и . Inf. Sci., (2014)