Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game model of safety investment in mines based on utility function., and . LISS, page 1-5. IEEE, (2016)Semantics-Based Representation Model for Multi-layer Text Classification., , , and . KES (2), volume 6277 of Lecture Notes in Computer Science, page 1-10. Springer, (2010)Energy-Efficient Admission of Delay-Sensitive Tasks for Multi-Mobile Edge Computing Servers., , , , , , , and . ICPADS, page 747-753. IEEE, (2019)Object recognition via contextual color attention., , , and . J. Vis. Commun. Image Represent., (2015)Model-Driven Development of Adaptive Service-Based Systems with Aspects and Rules., , and . WISE, volume 6488 of Lecture Notes in Computer Science, page 548-563. Springer, (2010)Adaptive Graph Constrained NMF for Semi-Supervised Learning., , and . PSL, volume 8183 of Lecture Notes in Computer Science, page 36-48. Springer, (2013)Cluster Validity and Stability of Clustering Algorithms., , and . SSPR/SPR, volume 3138 of Lecture Notes in Computer Science, page 957-965. Springer, (2004)A Net-Based Multi-tier Behavior Inheritance Modelling Method., , and . Ershov Memorial Conference, volume 2244 of Lecture Notes in Computer Science, page 279-286. Springer, (2001)Anomaly Detection Using Support Vector Machines., , and . ISNN (1), volume 3173 of Lecture Notes in Computer Science, page 592-597. Springer, (2004)Investigation of Novel Doubly Salient PM Variable Reluctance Resolvers., , , , , , and . IEEE Access, (2019)