Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for Evaluating Connectivity Availability in Random Sleep Scheduled Delay-Tolerant Wireless Networks., , , and . GLOBECOM, page 1-5. IEEE, (2010)The Application and Optimization of Unity Image Fusion Algorithm in HTC Vive Controllers Interaction., and . SimuTools, page 108-111. ACM, (2017)Exception Handling for Conflict Resolution in Cross-Organizational Workflows., , , and . Distributed Parallel Databases, 13 (3): 271-306 (2003)Leveraging Smart Supply Chain and Information System Agility for Supply Chain Flexibility., , , and . Inf. Syst. Frontiers, 21 (3): 547-564 (2019)Mapping Web Usage Patterns to MDP Model and Mining with Reinforcement Learning., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 698-702. Springer, (2005)Developing an Integration Framework for Crowdsourcing and Internet of Things with Applications for Disaster Response., , , and . DSDIS, page 520-524. IEEE Computer Society, (2015)Interactive Model Fitting for Human Robot Collaboration.. ICEBE, page 151-156. IEEE Computer Society, (2014)A Web Services Provisioning Optimization Model in a Web Services Community., and . ICEBE, page 689-696. IEEE Computer Society, (2005)Experimental Analysis of an RFID Security Protocol., , , , , , and . ICEBE, page 62-70. IEEE Computer Society, (2006)Stroke Data Analysis through a HVN Visual Mining Platform., , , , and . IV (2), page 1-6. IEEE, (2019)