From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

LTAM: A Location-Temporal Authorization Model., и . Secure Data Management, том 3178 из Lecture Notes in Computer Science, стр. 172-186. Springer, (2004)Empirical Investigation of EachNet: The eBay Model of C2C Online Auction in China., , , и . IEEE Trans. Engineering Management, 59 (1): 160-175 (2012)Hot Topic Detection Based on a Refined TF-IDF Algorithm., , , , и . IEEE Access, (2019)Reusing the permutation matrix dynamically for efficient image cryptographic algorithm., , , , и . Signal Process., (2015)Compressed sensing-based time-domain channel estimator for full-duplex OFDM systems with IQ-imbalances., , , , , , , , и . Sci. China Inf. Sci., 60 (8): 82303 (2017)Discrete blind reconstruction method for multi-coset sampling., , и . IET Signal Process., 10 (5): 465-470 (2016)Approximate Euclidean shortest paths amid convex obstacles., , и . SODA, стр. 283-292. SIAM, (2009)Practical methods for shape fitting and kinetic data structures using core sets., , , и . SCG, стр. 263-272. ACM, (2004)A 2D kinetic triangulation with near-quadratic topological changes., , и . SCG, стр. 180-189. ACM, (2004)Learning Invariant Representation Improves Robustness for MRC Models., , , , и . EMNLP (Findings), стр. 3306-3314. Association for Computational Linguistics, (2022)