Author of the publication

Application of Distributed Genetic Algorithm Based on Migration Strategy in Image Segmentation.

, , , and . ICNC (4), page 218-222. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel wayfinding system based on geo-coded qr codes for individuals with cognitive impairments., , , and . ASSETS, page 231-232. ACM, (2007)Designing Kinect2Scratch Games to Help Therapists Train Young Adults with Cerebral Palsy in Special Education School Settings., , , , , and . ASSETS, page 317-318. ACM, (2015)ARCoach 2.0: Optimizing a Vocational Prompting System Based on Augmented Reality for People with Cognitive Impairments., , , and . ASSETS, page 313-314. ACM, (2015)Designing a Kinect2Scratch Game to Help Teachers Train Children with Intellectual Disabilities for Pedestrian Safety., , , , , and . ASSETS, page 269-270. ACM, (2016)Application of Distributed Genetic Algorithm Based on Migration Strategy in Image Segmentation., , , and . ICNC (4), page 218-222. IEEE Computer Society, (2007)MPCODER: Multi-user Personalized Code Generator with Explicit and Implicit Style Representation Learning., , , , , and . CoRR, (2024)Lion: Minimizing Distributed Transactions through Adaptive Replica Provision (Extended Version)., , , , , , and . CoRR, (2024)Quantum Computing for Databases: A Short Survey and Vision., , , , , , , and . VLDB Workshops, volume 3462 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)Malware Detection by Exploiting Deep Learning over Binary Programs., , , and . ICPR, page 9068-9075. IEEE, (2020)Competitive Influence Blocking in Online Social Networks: A Case Study on WeChat., , , , and . APCC, page 251-256. IEEE, (2018)