Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RED for Improving TCP over Wireless Networks., and . International Conference on Wireless Networks, page 628-636. CSREA Press, (2004)From offline to online: connecting people with a mobile social networking application at a conference., , , and . CCHI, page 40-49. ACM, (2014)Noisy Speech Pitch Detection Based on Mathematical Morphology and Weighted MACF., , and . SINOBIOMETRICS, volume 3338 of Lecture Notes in Computer Science, page 594-601. Springer, (2004)Axiomatic approaches of fuzzy concept operators., , and . ICMLC, page 249-254. IEEE, (2012)The data validity evaluation in land change survey based on remote sensing., , and . Geoinformatics, page 1-5. IEEE, (2010)A nosocomial-pathogens-infections model with impulsive antibiotics treatment on multiple bacteria., , and . Appl. Math. Comput., (2017)基于不协调决策信息系统的有效教学影响因素分析 (Analysis of Factors of Effective Teaching Based on Inconsistent Decision Information Systems)., and . 计算机科学, 42 (6): 107-110 (2015)A Novel Approach to Attribute Reduction in Concept Lattices., and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 522-529. Springer, (2006)Eingerprint: Robust Energy-related Fingerprinting for Passive RFID Tags., , , , , and . NSDI, page 1101-1113. USENIX Association, (2020)Formal Modeling and Verification of Multi-agent System Based on Timed Automata., , and . ISKE, page 231-235. IEEE, (2021)