Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting fast hardware floating point in high precision computation., and . ISSAC, page 111-118. ACM, (2003)Research on the selection of strategic supplier based on grey relation and multi level fuzzy evaluation in the electronics industry., and . SMC, page 12-16. IEEE, (2012)Qualitative Analysis for a Kind of Predator-Prey Model of Holling III-Function Response with Nonlinear Density Dependent., , and . CIS, page 1532-1535. IEEE Computer Society, (2011)Dim and Small Space-Target Detection and Centroid Positioning Based on Motion Feature Learning., , , , , , and . Remote. Sens., 15 (9): 2455 (May 2023)Parameter Estimation of Software Reliability Model and Prediction Based on Hybrid Wolf Pack Algorithm and Particle Swarm Optimization., , , and . IEEE Access, (2020)Robust self-tuning multi-view clustering., , , , and . World Wide Web, 25 (2): 489-512 (2022)Research on Tunnel Construction Monitoring Method Based on 3D Laser Scanning Technology., , , , and . Symmetry, 14 (10): 2065 (2022)A Novel Tensor Learning Model for Joint Relational Triplet Extraction., , , , and . IEEE Trans. Cybern., 54 (4): 2483-2494 (April 2024)An empirical evaluation of deep learning-based source code vulnerability detection: Representation versus models., , , , , and . J. Softw. Evol. Process., (November 2023)Building a Large-Scale Knowledge Graph for Elementary Education in China., , , , and . JIST (2), volume 1157 of Communications in Computer and Information Science, page 1-12. Springer, (2019)