Author of the publication

Design and Implementation of a Distributed Learning Resource Registry System.

, , and . CIT, page 333-338. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient GPU Out-of-core Visualization of Large-scale CAD Models with Voxel Representations, , and . Adv. Eng. Softw., 99 (C): 73--80 (September 2016)A Novel Grid Based K-Means Cluster Method for Traffic Zone Division., , and . CloudCom-Asia, volume 9106 of Lecture Notes in Computer Science, page 165-178. Springer, (2015)A Heuristic Q-Learning Architecture for Fully Exploring a World and Deriving an Optimal Policy by Model-Based Planning., , and . ICRA, page 2078-2083. IEEE Robotics and Automation Society, (1999)Increasing temporal diversity with purchase intervals., , , and . SIGIR, page 165-174. ACM, (2012)Detection of Fatigued Face., , , and . CCRIS, page 224-229. ACM, (2021)Data-Flow Based Analysis of Java Bytecode Vulnerability., , and . WAIM, page 647-653. IEEE Computer Society, (2008)Research on the Construction of Dynamic Chinese Natural Sign Language Corpus., , and . MSN, page 502-505. IEEE Computer Society, (2013)The Nondestructive Testing Approach of Acoustic Emission for Environmentally Hazardous Objects., , , , and . MSN, page 474-477. IEEE Computer Society, (2013)Towards Detecting the Interaction Vulnerabilities in Large Distributed System., , , and . CIT, page 2843-2848. IEEE Computer Society, (2010)Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS)., , , , , , , and . DSC, page 923-929. IEEE, (2018)