Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Energy-efficient MAC Protocol with Delay-bounded Downlink Traffic Scheduling Strategy for 802.11 Wireless LANs., , and . J. Networks, 9 (7): 1747-1755 (2014)Abnormality Detection with Rényi Divergence for Univariate Gaussian Data., , and . PACRIM, page 1-6. IEEE, (2019)Prediction of Crime Hotspots based on Spatial Factors of Random Forest., , , , , , and . ICCSE, page 811-815. IEEE, (2020)The Application of Wavelet Transform in the Analysis of Leymus Chinensis Communities Vegettion Pattern., and . BMEI, page 1-4. IEEE, (2009)Inverse synchronization of different chaotic neural networks with mixed delays., and . BIC-TA, page 21-25. IEEE, (2010)SUNVE: Distributed Message Middleware towards Heterogeneous Database Synchronization., , , , , , , and . ICAIT, page 160-166. IEEE, (2018)Biomedical named entity normalization via interaction-based synonym marginalization., , , , , and . J. Biomed. Informatics, (2022)Zeta: A Scalable and Robust East-West Communication Framework in Large-Scale Clouds., , , , , , , , and . NSDI, page 1231-1248. USENIX Association, (2022)A Study on Automatic Generation of Chinese Discharge Summary., , , , and . BIBM, page 1681-1687. IEEE, (2019)Continuity scaling: A rigorous framework for detecting and quantifying causality accurately., , , , , and . CoRR, (2022)