Author of the publication

Scheduling Sensor Transactions to Maintain Data Temporal Validity.

, , , and . CSSE (4), page 206-209. IEEE Computer Society, (2008)978-0-7695-3336-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I-GCN: Robust Graph Convolutional Network via Influence Mechanism., and . CoRR, (2020)Group locality preserving orthogonal nonnegative matrix factorization., , and . FSKD, page 2086-2088. IEEE, (2010)Scheduling Sensor Transactions to Maintain Data Temporal Validity., , , and . CSSE (4), page 206-209. IEEE Computer Society, (2008)978-0-7695-3336-0.A top-down design process oriented adaptive conceptual layout design environment based on semantic norm model., , , , and . CSCWD, page 800-804. IEEE, (2012)Fine-Grained Graph Learning for Multi-View Subspace Clustering., , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (4): 2804-2815 (August 2024)Manifold Adaptive Label Propagation for Face Clustering., , , and . IEEE Trans. Cybern., 45 (8): 1681-1691 (2015)Knowledge Reduction of Rough Set Based on Partition., and . IDEAL, volume 3578 of Lecture Notes in Computer Science, page 48-55. Springer, (2005)A Heuristic Algorithm for Maximum Distribution Reduction., and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 1297-1302. Springer, (2005)Unrestricted Adversarial Samples Based on Non-semantic Feature Clusters Substitution., and . CoRR, (2022)CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters., , and . TrustCom, page 258-265. IEEE, (2022)