Author of the publication

Understanding business models of mobile ecosystems in China: a case study.

, and . MEDES, page 64-71. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on Chinese consumers' concern about books on online bookstores., , and . ICUIMC, page 61. ACM, (2013)HSM-SMCS: Task Assignment Based on Hybrid Sensing Modes in Sparse Mobile Crowdsensing., , , , and . IEEE Internet Things J., 10 (5): 4034-4048 (March 2023)Security Threats in the Data Plane of Software-Defined Networks., , , and . IEEE Netw., 32 (4): 108-113 (2018)Accelerated training of bootstrap aggregation-based deep information extraction systems from cancer pathology reports., , , , , , , , , and 3 other author(s). J. Biomed. Informatics, (2020)Requirements for computerized tools to design information security policies., , and . Comput. Secur., (2020)EWOD Chip with Micro-Barrier Electrode for Simultaneous Enhanced Mixing during Transportation., , , and . Sensors, 23 (16): 7102 (August 2023)Pedestrian detection algorithm based on improved SSD., , , and . Int. J. Comput. Appl. Technol., 65 (1): 25-35 (2021)Can re-infiltration process be ignored for flood inundation mapping and prediction during extreme storms? A case study in Texas Gulf Coast region., , , , , , , and . Environ. Model. Softw., (2022)Three-party quantum secret sharing against collective noise., , , , and . Quantum Inf. Process., 18 (7): 215 (2019)Lifestyles and Mobile Services Adoption in China., , , and . IJEBR, 10 (3): 36-53 (2014)