Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative analysis of the effect of transmitting power on the capacity of wireless ad hoc networks., , , , and . MobiHoc, page 231-240. ACM, (2010)Predicting Essential Genes and Proteins Based on Machine Learning and Network Topological Features: A Comprehensive Review, , and . Frontiers in Physiology, (Mar 8, 2016)Subjective Negative Structure in Chinese: A Case Study of "Da 'Big' + NP (De)" Sentence with the Uncorrelated Relations.. CLSW, volume 12278 of Lecture Notes in Computer Science, page 118-126. Springer, (2020)A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value., , , and . IAS, page 563-566. IEEE Computer Society, (2009)How to Train Triplet Networks with 100K Identities?, , and . ICCV Workshops, page 1907-1915. IEEE Computer Society, (2017)Factors Influencing Farmers' Willingness to Pay for Weather Index Insurance Through Fuzzy-Set Qualitative Comparative Analysis: Insights from a Pilot in Jiangxi Province, China., , , , , and . MMBD, volume 329 of Frontiers in Artificial Intelligence and Applications, page 83-97. IOS Press, (2020)Sequential wireless sensor network discovery using wide aperture array signal processing., , , , , , , , and . EUSIPCO, page 2278-2282. IEEE, (2012)A Solution of Code Authentication on Android., and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 356-362. Springer, (2015)Interactive Whiteboard-Based Instruction Versus Lecture-Based Instruction: A Study on College Students' Academic Self-efficacy and Academic Press., , , and . ICBL, volume 10309 of Lecture Notes in Computer Science, page 319-328. Springer, (2017)An Improved Path-Based Transductive Support Vector Machines Algorithm for Blind Steganalysis Classification., and . AICI, volume 5855 of Lecture Notes in Computer Science, page 453-462. Springer, (2009)