Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Quantitative Association Rules on Overlapped Intervals., , and . ADMA, volume 3584 of Lecture Notes in Computer Science, page 43-50. Springer, (2005)Malware Clustering Using Family Dependency Graph., , , and . IEEE Access, (2019)A novel and complete approach for storing RDF(S) in relational databases., , and . Int. Arab J. Inf. Technol., 16 (5): 894-903 (2019)A Prediction Approach for Video Hits in Mobile Edge Computing Environment., , , , , and . Secur. Commun. Networks, (2020)Multi-Strategy Dynamic Evolution-Based Improved MOEA/D Algorithm for Solving Multi-Objective Fuzzy Flexible Job Shop Scheduling Problem., , , , and . IEEE Access, (2023)Mapping Object-Oriented Database Models Into RDF(S).. IEEE Access, (2018)Non-negative Matrix Factorization Based Learning from Label Proportions for Vehicle Loan Default Detection., , and . ITQM, volume 162 of Procedia Computer Science, page 878-886. Elsevier, (2019)A Security Technology for Mobile Agent System Improved by Trusted Computing Platform., and . HIS (3), page 46-50. IEEE Computer Society, (2009)Walking Telescope: Exploring the Zooming Effect in Expanding Detection Threshold Range for Translation Gain., , , , and . CVM (1), volume 14592 of Lecture Notes in Computer Science, page 252-273. Springer, (2024)Frequency compensated diffusion model for real-scene dehazing., , , , and . Neural Networks, (2024)