From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Detecting community structure for undirected big graphs based on random walks., , , , и . WWW (Companion Volume), стр. 1151-1156. ACM, (2014)LogLog Filter: Filtering Cold Items within a Large Range over High Speed Data Streams., , , , , и . ICDE, стр. 804-815. IEEE, (2021)Efficient topology optimization for a wired networked system by adding wireless communication., , , и . ACC, стр. 448-453. IEEE, (2012)EV charging load scheduling with high wind power penetration: A robust shortest path approach., , и . ACC, стр. 2765-2770. IEEE, (2015)Event-based optimization for dispatching policies in material handling systems of general assembly lines., , , , и . CDC, стр. 2173-2178. IEEE, (2008)Identifying Vulnerable Set of Cascading Failure in Power Grid Using Deep Learning Framework., , , , , , и . CASE, стр. 885-890. IEEE, (2021)A Linear Probabilistic Optimal Power Flow Model with Linearization Error Checking., , , и . ISGT Asia, стр. 170-174. IEEE, (2022)Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System., , , , и . CASE, стр. 979-984. IEEE, (2019)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , и . ISNN (2), том 3174 из Lecture Notes in Computer Science, стр. 657-662. Springer, (2004)Meta Reinforcement Learning with Task Embedding and Shared Policy., , , и . IJCAI, стр. 2794-2800. ijcai.org, (2019)