Author of the publication

Chinese coding type identification based on sub-sentence length observation.

, , , and . NLPKE, page 1-5. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Technologies and Research Challenges on Microservice-Based NFV., , and . J. Softw., 15 (5): 138-146 (2020)Spatio-temporal reasoning and query of agricultural geographic information based on geo-ontology and SWRL., , , and . Geoinformatics, page 1-6. IEEE, (2010)Chinese coding type identification based on sub-sentence length observation., , , and . NLPKE, page 1-5. IEEE, (2009)A two-layer traffic clustering framework for network virtualization., , , and . ISCIT, page 262-267. IEEE, (2011)The Change-of-Feature Spatio-temporal Object Relational Model and Its implement., , , and . ESIAT (1), page 194-197. IEEE Computer Society, (2009)Three levels of compression strategies and testings in mobile GIS attribute management., , , and . Communications, Internet, and Information Technology, page 205-209. IASTED/ACTA Press, (2007)Analysis of network node behavior based on MapReduce., , and . CCIS, page 193-197. IEEE, (2014)An Experimental Study on The Unfairness in Adaptive Streaming with HTTP/2 Server Push., , , , , and . VSIP, page 94-98. ACM, (2019)I-HASH multiple various position pattern matching algorithm in Internet application identification., , , and . IC-NIDC, page 280-283. IEEE, (2012)Modeling, design and optimization of hybrid electromagnetic and piezoelectric MEMS energy scavengers., , and . CICC, page 177-180. IEEE, (2008)